![](https://www.pwndefend.com/wp-content/uploads/2021/02/iStock-901953216-730x350.jpg)
Working out what exploits to care about is a tough job, kill chains, availability of exploits, complexity, data flows, controls etc. all play a part in understanding a vulnerability and how it affects your organisational risk. To support this effort I’ve started to compile a list of public exploits against CISA Known Exploited Vulnerabilities (KEV). This may be useful for defensive and offensive security pros.
![](https://www.pwndefend.com/wp-content/uploads/2022/06/image-43-1024x762.png)
USE AT OWN RISK! I have not validated and vetted any of the links on the workbook!
Thoughts and feedback welcome, hit me up on Twitter!
Be safe!