
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. It serves as a repository for exploits and proof-of-concepts, making it a valuable resource for those who need actionable data right away. The database also includes the Google Hacking Database (GHDB), a categorized index of Internet search engine queries designed to uncover interesting and sensitive information made publicly available on the Internet. The GHDB is a valuable resource for penetration testers and vulnerability researchers, providing a collection of search queries that can be used to uncover sensitive information. The database is maintained by OffSec, an information security training company, and is provided as a public service. The Exploit Database and GHDB are essential tools for anyone involved in penetration testing, vulnerability research, or cybersecurity in general.
Common questions about ExploitDB including features, pricing, alternatives, and user reviews.
ExploitDB is A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information. It is a Vulnerability Management solution designed to help security teams with Vulnerability Research, CVE.
A Linux exploit suggestion tool that identifies potential privilege escalation vulnerabilities by analyzing kernel versions and matching them against a database of known exploits.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.