Skip to content

Latest commit

 

History

History
17 lines (13 loc) · 1007 Bytes

File metadata and controls

17 lines (13 loc) · 1007 Bytes

TargetServer Exploit Simulator 🎯

A Python-based Object-Oriented Programming (OOP) project demonstrating basic server vulnerability scanning and state-change exploitation. Built as a foundational component for the Brainwavey / Fathom OS architecture.

🧠 Concepts Demonstrated

  • Object-Oriented Programming: Blueprint creation using classes and __init__ constructors.
  • State Management: Tracking dynamic variables (e.g., is_hacked boolean states).
  • Method Execution: Building class-specific functions (scan() and exploit()) to interact with object data.

🚀 How It Works

The script initializes a TargetServer object with a designated IP address and a known vulnerability status.

  1. The scan() method acts as a recon tool, logging the server's current footprint.
  2. The exploit() method simulates a breach, permanently flipping the server's internal security state.
  3. The final output verifies the compromised status of the target.

💻 Tech Stack

  • Python 3