Tittle says it all but touch more context. Can it be coded in a similar way to work as a USB rubber ducky
Just want a yes or no
[link] [comments]
from hacking: security in practice https://ift.tt/3zSZ8Td
Tittle says it all but touch more context. Can it be coded in a similar way to work as a USB rubber ducky
Just want a yes or no
Comments
Post a Comment