I have already read many articles about exploits and also tried to test some on my second PC. I know that the key of using exploits is to upload a payload to the victim which then gets executed (as the instruction pointer got manipulated)
My question is: Is it possible to use exploits for loading payloads to the victim without the need of opening an already malicious file on that computer?
I am asking this because all I read about in the internet was about sending emails with malicious files which then get opened by the victim in order to make the victim's PC communicate with the attacker's PC to make the magic happen.