How are hackers able to hack a target without installing malware? [duplicate]

How do hackers place a RAT or Trojan on the target’s computer without downloading the files to the target computer, just by clicking on a link? Or can they take over the target’s computer by opening a file in the browser without downloadin… Continue reading How are hackers able to hack a target without installing malware? [duplicate]