Vulnerabilities
Weaponized Exploit
Also known as: Operational exploit
Definition
A reliable, fully developed exploit ready for real-world use — typically integrated into malware, intrusion frameworks, or attacker tradecraft.
Examples
- WannaCry weaponizing EternalBlue (CVE-2017-0144) into a self-spreading worm.
- Cobalt Strike beacons paired with weaponized n-day VPN exploits.
Related terms
Exploit
A piece of code, data, or technique that takes advantage of a vulnerability to cause unintended behaviour such as code execution, privilege escalation, or information disclosure.
Proof-of-Concept Exploit
A minimal, often non-weaponized piece of code that demonstrates a vulnerability is real and exploitable, typically published for research or coordinated disclosure.
Zero-Day Exploit
Working exploit code for a vulnerability that the vendor does not yet know about, or for which no patch is available — extremely valuable to attackers.
Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) — definition coming soon.
Ransomware
Malware that encrypts a victim's data or locks systems and demands payment in exchange for restoring access.
Vulnerability
A weakness in a system, application, or process that an attacker can exploit to violate confidentiality, integrity, or availability.