1. Kondalwar, M.N. and Shelke, C.J., 2014. Remote administrative trojan/tool (RAT). Int. J. Comput. Sci. Mob. Comput, 3333(3), pp.482-487.
2. Barapatre, K. and Parkhi, P., 2020. Android Spy Agent-Remote Access Trojan. International Research Journal of Engineering and Technology.
3. P. A. S. D. S. W. A. K., 2017. Remote Access Tool Using Metasploit. International Journal on Recent and Innovation Trends in Computing and Communication, 5(4), pp. 425–427.
4. Bauri, M.C.K., Indulkar, M.C., Jadhav, M.S. and Khandagale, A.S., Windows Post Exploitation [MSF] Keylogger for Security.
5. Tabatabai Irani, M. and Weippl, E.R., 2009. Automation of post‐exploitation. International Journal of Web Information Systems, 5(4), pp.518-536.