Titre complet: Microsoft Windows Silent Process Exit Persistence Exploit Catégorie: remote exploits Plateforme: windows This Metasploit module uploads a payload and declares that it is the debug process to launch when a specified process exits. # 0day.today @ http://0day.today/