Skip to content

Brainwavey/Target-Server_Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 

Repository files navigation

TargetServer Exploit Simulator 🎯

A Python-based Object-Oriented Programming (OOP) project demonstrating basic server vulnerability scanning and state-change exploitation. Built as a foundational component for the Brainwavey / Fathom OS architecture.

🧠 Concepts Demonstrated

  • Object-Oriented Programming: Blueprint creation using classes and __init__ constructors.
  • State Management: Tracking dynamic variables (e.g., is_hacked boolean states).
  • Method Execution: Building class-specific functions (scan() and exploit()) to interact with object data.

πŸš€ How It Works

The script initializes a TargetServer object with a designated IP address and a known vulnerability status.

  1. The scan() method acts as a recon tool, logging the server's current footprint.
  2. The exploit() method simulates a breach, permanently flipping the server's internal security state.
  3. The final output verifies the compromised status of the target.

πŸ’» Tech Stack

  • Python 3

About

A python Script Demonstrating Oblect Oriented Programming (OPP) to stimulate a server vulnerability scan.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages