Skip to content
#

exploit-kit

Here are 26 public repositories matching this topic...

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

  • Updated Apr 10, 2025
  • Visual Basic .NET

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

  • Updated Apr 10, 2025
  • Visual Basic .NET

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

  • Updated Apr 10, 2025
  • Visual Basic .NET

Improve this page

Add a description, image, and links to the exploit-kit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit-kit topic, visit your repo's landing page and select "manage topics."

Learn more