Using the USB protocol vulnerability, by changing the USB internal firmware, after the normal USB interface access, simulate the function of external mouse and keyboard, so as to make the target host to execute the well-constructed command
License: BSD 3-Clause "New" or "Revised" License
C++ 58.38%C 1.68%C# 2.51%Java 3.81%Raku 1.67%PowerShell 3.22%Python 3.49%Ruby 1.67%VBA 1.43%Classic ASP 19.94%ASP.NET 1.46%PHP 0.58%Perl 0.12%Shell 0.04%
In fact, when running the msf connection Trojan, even though I have modified the download server address to my own server address, a large number of windows that open the resource manager and screen settings will pop up when the code is executed, but the real program is not executed.