Also known as Exploit kit.
Exploits are typically distributed in packs containing multiple exploits for different vulnerabilities.
The pack is used to identify software installed on a victim’s computer, match it against the list of exploits in the pack and deploy the appropriate exploit if one of the applications installed is vulnerable.