Made new deployment method for Hyper-V backdoor: Windows Boot Manager image file infection with emulation of enabled UEFI Secure Boot [1/3] https://github.com/Cr4sh/s6_pcie_microblaze/commit/bea330d215a59b0014e0d35f715a34be322f61f7 … https://github.com/Cr4sh/s6_pcie_microblaze/blob/master/python/payloads/DmaBackdoorHv/README.MD#deploying-the-backdoor-using-windows-boot-manager-infection …pic.twitter.com/ywfvIt7ddj