Exploit network devices, security devices, and/or terminals or environments using various methods or tools.