Heroin details

  • Description

    Once your system has been compromised at the root level, it is possible for an intruder to hide completely without modifying any binaries or leaving any visible backdoors behind. Demonstrate the potentials of a malicious module.