👩‍💻Necessary Installations

In order to run the tools necessary for this attack, there are several programs that must be installed on your Mac. All of these programs will be installed from the terminal.

Last updated