[1]
Fahad Amin, Nadeem Daudpota, and Dr Ajab Khan, “A COMPLETE PENETRATION TESTING FRAMEWORK: SIMULATING ATTACKS AND EVALUATING POST-EXPLOITATION TECHNIQUES WITH KALI LINUX AND METASPLOIT”, SES, vol. 3, no. 7, pp. 386–407, Jul. 2025.