Using the USB protocol vulnerability, by changing the USB internal firmware, after the normal USB interface access, simulate the function of external mouse and keyboard, so as to make the target host to execute the well-constructed command
Geek Repo:Geek Repo
Github PK Tool:Github PK Tool