exploit 音标拼音: ['ɛkspl
, ɔɪt] [
, ɛkspl'ɔɪt]
vt . 剥削,开发,利用
n . 功劳,功绩,功勋
剥削,开发,利用功劳,功绩,功勋
exploit 开拓
exploit n 1 :
a notable achievement ; "
he performed a great feat "; "
the book was her finest effort " [
synonym : {
feat }, {
effort },
{
exploit }]
v 1 :
use or manipulate to one '
s advantage ; "
He exploit the new taxation system "; "
She knows how to work the system "; "
he works his parents for sympathy " [
synonym : {
exploit }, {
work }]
2 :
draw from ;
make good use of ; "
we must exploit the resources we are given wisely " [
synonym : {
exploit }, {
tap }]
3 :
work excessively hard ; "
he is exploiting the students " [
synonym :
{
overwork }, {
exploit }]
Exploit \
Ex *
ploit "\,
n . [
OE .
esploit success ,
OF .
esploit ,
espleit ,
revenue ,
product ,
vigor ,
force ,
exploit ,
F .
exploit exploit ,
fr .
L .
explicitum ,
prop .
p .
p .
neut .
of explicare to unfold ,
display ,
exhibit ;
ex plicare to fold .
See {
Ply },
and cf . {
Explicit }, {
Explicate }.]
1 .
A deed or act ;
especially ,
a heroic act ;
a deed of renown ;
an adventurous or noble achievement ;
as ,
the exploits of Alexander the Great .
[
1913 Webster ]
Ripe for exploits and mighty enterprises . --
Shak .
[
1913 Webster ]
2 .
Combat ;
war . [
Obs .]
[
1913 Webster ]
He made haste to exploit some warlike service .
--
Holland .
[
1913 Webster ]
2 . [
F .
exploiter .]
To utilize ;
to make available ;
to get the value or usefulness out of ;
as ,
to exploit a mine or agricultural lands ;
to exploit public opinion . [
Recent ]
[
1913 Webster ]
3 .
Hence :
To draw an illegitimate profit from ;
to speculate on ;
to put upon . [
Recent ]
[
1913 Webster ]
In no sense whatever does a man who accumulates a fortune by legitimate industry exploit his employ ['
e ]
s or make his capital "
out of "
anybody else . --
W .
G .
Sumner .
[
1913 Webster ]
111 Moby Thesaurus words for "
exploit ":
abuse ,
accomplished fact ,
accomplishment ,
achievement ,
act ,
acta ,
action ,
adventure ,
apply ,
aristeia ,
attainment ,
beguile ,
benefit from ,
bestow ,
bleed ,
bleed white ,
blow ,
bold stroke ,
capitalize on ,
cash in on ,
clip ,
coup ,
cultivate ,
dealings ,
deed ,
do ,
doing ,
doings ,
drain ,
effort ,
employ ,
emprise ,
endeavor ,
enterprise ,
exercise ,
fait accompli ,
feat ,
finesse ,
fleece ,
gest ,
go ,
gouge ,
hand ,
handiwork ,
handle ,
heroic act ,
hold up ,
ill -
use ,
impose ,
impose upon ,
improve ,
improve the occasion ,
job ,
jockey ,
make capital of ,
make hay ,
make use of ,
maneuver ,
manipulate ,
measure ,
milk ,
misuse ,
move ,
operation ,
overcharge ,
overprice ,
overt act ,
overtax ,
passage ,
performance ,
play ,
play on ,
presume upon ,
proceeding ,
production ,
profit by ,
profiteer ,
put to advantage ,
res gestae ,
screw ,
skin ,
soak ,
step ,
stick ,
sting ,
stroke ,
stunt ,
suck dry ,
surcharge ,
swindle ,
take advantage of ,
thing ,
thing done ,
tour de force ,
trade on ,
transaction ,
turn ,
turn to account ,
turn to profit ,
turn to use ,
undertaking ,
use ,
use ill ,
use to advantage ,
utilize ,
venture ,
victimize ,
work ,
work on ,
work upon ,
works
安装中文字典英文字典查询工具!
中文字典英文字典工具:
复制到剪贴板
英文字典中文字典相关资料:
Exploit Database - Exploits for Penetration Testers, Researchers, and . . . The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more
Exploit Database Statistics Exploit Database Statistics The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years They will be re-generated, at minimum, on a monthly basis and will help you visualize how the exploit landscape is changing over time
Exploit Database Papers Archived security papers and articles in various languages
Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers
motionEye 0. 43. 1b4 - RCE - Multiple webapps Exploit motionEye 0 43 1b4 - RCE CVE-2025-60787 webapps exploit for Multiple platform
Exploit Database SearchSploit Manual Exploit-DB Online The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use However, some of the exploit metadata (such as screenshots, setup files, tags, and vulnerability mappings) are not included To access them, you will need to check the website
Exploit Database FAQ Exploit Database frequently asked questions We have not hacked your websites or your software We collect publicly available exploits from the internet and archive them here
OpenSSH server (sshd) 9. 8p1 - Race Condition - Linux remote Exploit OpenSSH server (sshd) 9 8p1 - Race Condition CVE-2024-6387 remote exploit for Linux platform
AVTECH IP Camera NVR DVR Devices - Exploit Database AVTECH IP Camera NVR DVR Devices - Multiple Vulnerabilities webapps exploit for CGI platform
Windows File Explorer Windows 11 (23H2) - Exploit Database Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure CVE-2025-24071 remote exploit for Windows platform