Homebrew Exploits: Difference between revisions

Line 43: Line 43:


==Secondary Exploits==
==Secondary Exploits==
Installation of these exploits requires a previously exploited system.
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
 
{| class="wikitable" border="1"
{| class="wikitable" border="1"
!  Name
!  Name