Skip to content
#

slient-exploit-builder

Here are 9 public repositories matching this topic...

Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.

  • Updated Jun 26, 2025
  • Visual Basic .NET

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

  • Updated Jun 26, 2025
  • Visual Basic .NET

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

  • Updated Jun 26, 2025
  • Visual Basic .NET

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

  • Updated Jun 4, 2025
  • C#

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

  • Updated Jun 4, 2025
  • C++

Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.

  • Updated Jun 26, 2025
  • Visual Basic .NET

Improve this page

Add a description, image, and links to the slient-exploit-builder topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the slient-exploit-builder topic, visit your repo's landing page and select "manage topics."

Learn more