Go use exploits somewhere else 0:00 Intro 0:14 Encounter with the exploiter 0:40 First proof 1:56 Second proof 2:57 Exploiter get killed 5:38 Showing the profile 5:50 Outro