I'm very confused abt using exploits.
I mean i know abt getting vulnerabilities of some system or website. But i'm trying to digg for how to make exploits and how to use them for network breaches.
Plz, any reference or any kind of help is expected.: