Skip to content
#

reg

Here are 31 public repositories matching this topic...

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

  • Updated Jun 3, 2025
  • Visual Basic .NET

Improve this page

Add a description, image, and links to the reg topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the reg topic, visit your repo's landing page and select "manage topics."

Learn more