ping
Most of these “exploits” require physical access to the machine or for a user to purposefully install a piece of software. I take them with a grain of salt.