See all categories.
During a red team engagement, it can be interesting to learn how to weaponize a USB key (all in full storage) to gain initial access.