Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.
Subcategories 1
Related categories 3
Sites 15
- Security Focus Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
- Security Tracker Archive of exploits and security advisories
- Fyodor's Exploit World A large and descriptive exploit archive organized by affected operating systems.
- Exploiting Caller ID The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
- Metasploit Framework Open source penetration testing software with a large, active community.
- HellBound Hackers Well established resource and forum for exploits, tools and learning the basics of hacking.
- Ill Mob Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
- Rapid7 Vulnerability and Exploit Database A collection of disclosed exploits and vulnerabilities in various major software products.
- Canvas Exploit Platform A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
- Offensive Security Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
- High-Tech Bridge: Security Advisories Database of vulnerabilities in software.
- Exploit Database An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
- SoldierX A collection of security and exploit resources. Also has a large IRC community.
- OverTheWire: WarGames Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
- Phenoelit Collection of older exploits and tools.