Exploit Kits automate the identification and use of vulnerabilities in machines and devices connected to the internet – anywhere, like a vulnerability scan. However, an exploit kit then automates sending malware to those machines and devices that are vulnerable. Think of it like a global army of burglars running through towns, rattling doors, finding which ones are unlocked and calling back to base with the information. Then, upon instruction from base, all burglars go and break into the unlocked houses.
Adapted from Ernst (2013)