imagine the following situation You are an Ethical Hacker. while solving the CTF challenges, you want to send a file to the target machine. After lots of research, You discovered that there are no such tools exist in the target system...