Get information about a compromised machine from the to find possible ways to escalate privileges
Last updated 24 days ago