In this chapter, we will cover the following recipes:
- Working with auxiliary modules
- DoS attack modules
- Post-exploitation modules
- Understanding the basics of module building
- Analyzing an existing module
- Building your own post-exploitation module
- Building your own auxiliary module