$ Initializing system breach...
$ Bypassing security protocols [██████████] 100%
$ Uploading payload...
$ Establishing persistent connection...
$ |