What are malicious usb keys and how to create a realistic one? | blog post

This blog post shows how to create a reliable and realistic-looking malicious USB key that can be used in a drop attack.