The exploit builder generates malicious documents, such as Word and PDF documents, Excel workbooks, CHM - compiled help files, and HTML pages. Most of them serve as downloaders, with the final payload stored at a website which is then downloaded and executed by the malicious code. In a few cases the generated document stores the entire payload file within. As a result, there is no need to reach out to an external web location as the malicious content is extracted from the document and executed from there.
Exploit: PDF, DOC, HTML
Link:
*** Hidden text: cannot be quoted. ***