Rosecurifylog.rosecurify.comยทNov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War ๐ SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...seclogBlueHat2024Add a thoughtful commentNo comments yetBe the first to start the conversation.