01Retrieve comprehensive information about specific exploits, including code
02Track newly added exploits
03Search for exploits by keywords, CVE IDs, platforms, etc.
04Find all exploits related to specific CVE IDs
05Get insights into exploit distribution by platform, type, and year