Skip to content
#

reg-exploit

Here is 1 public repository matching this topic...

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

  • Updated May 21, 2025
  • Visual Basic .NET

Improve this page

Add a description, image, and links to the reg-exploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the reg-exploit topic, visit your repo's landing page and select "manage topics."

Learn more