Skip to main content
Dudji's Docs home page
Overview
Playbook
Attacks
Tech
Payloads
Tools
Home
Home
Search...
Search...
Navigation
Exploitation
Exploitation
Overview
Playbook
Recon
Enumeration
Exploitation
Post-Exploitation
Exploitation
Exploitation
Turning enumeration findings into initial access.
This section is currently being built out. Check back soon.
Exploitation is the phase where identified vulnerabilities are
weaponized
to gain initial access to a system or application.
Web Enumeration
Post-Exploitation
⌘I
Assistant
Responses are generated using AI and may contain mistakes.