why you guys are using ready programs like metasploit and just pressing one button or just writing exploit right after setting the rhost
and is it really difference if i could make my own exploit rather than use ready programs to exploit?
and is it really difference if i could make my own exploit rather than use ready programs to exploit?