DISCLAIMER - DO NOT RUN

This model is intended solely for research purposes. It conains malicious code (with controls to be executed only in specific endpoints) and should only be executed in a controlled environment. It is designed to demonstrate potential security vulnerabilities and should not be used maliciously or for any unauthorized activities

If you have any questions or concerns regarding this experiment, please contact us at supplychainsecurity@checkmarx.com for clarification or assistance.

By using this script, you agree to adhere to ethical and legal guidelines, and you accept all responsibility for any consequences that may arise from its use. Use it responsibly and only on systems and networks that you have explicit permission to access and assess.