Index¶ Exploitation Examples¶ Real-world exploitation scenarios across web, network, mobile, and binary targets. Each example includes methodology, payloads, and post-exploitation insights.