This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Exploit Development
There are no products or services included for this phase because Exploit Development typically occurs in secret, outside of the view of defenders. Subsequently, during this phase of the intrusion method, products and services cannot detect, deny, disrupt, degrade, or complete any other objective.