Other than that, custom malicious codes and
tools are used to exploit zero-day vulnerabilities in order to gain an advantage over the control of
vulnerable network or machines prior to the knowledge of such vulnerabilities by the vendor or the
security community.