The component of an exploit that performs the actual malicious action after a vulnerability is triggered, such as opening a shell, downloading malware, or exfiltrating data.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free