Interesting ways to use WSL in InfoSec Looking to find out interesting ways WSL is being used for InfoSec.