Empire

how to
How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

how to
Create a Fake PDF Trojan with AppleScript, Part 1

how to
How to Use PowerShell Empire: Generating Stagers for Post Exploitation of Windows Hosts