Malleum Knowledge Base
Search
Search
Dark mode
Light mode
Reader mode
Explorer
Home
❯
Pentesting AD
❯
Linux Post Exploitation
Linux Post Exploitation
Jan 23, 2026
1 min read
User Configuration Files
Vim config simple backdoor
Graph View
Table of Contents
User Configuration Files
Vim config simple backdoor