Menu:

Yes exploit toolkit

It is well known that most drive-by downloads rely on exploit toolkits to fingerprint the victim's browser, identify the right exploits to launch, obfuscate the exploit code, and send it to the target.

Different exploit toolkits compete with each other on several of features. Obviously, the number and reliability of exploits. But also on user friendliness and look and feel. As evidence of this, check the interface of the Yes exploit toolkit:

Interface of the Yes toolkit

No question, they spent some time on that desktop-like, web 2.0 interface...

To leave a comment, complete the form below. Mandatory fields are marked *.

Comment details