Homebrew Exploits: Difference between revisions
Line 43: | Line 43: | ||
==Secondary Exploits== | ==Secondary Exploits== | ||
Installation of these exploits requires a previously exploited system. | Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | ||
{| class="wikitable" border="1" | {| class="wikitable" border="1" | ||
! Name | ! Name |