Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.
More information
More information
Subcategories 1
Related categories 3
Sites 14
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
Describes the speculative execution attack on Intel processors which allows an attacker to steal sensitive information. Includes a demo, proof of concept code, and questions and answers.
A large and descriptive exploit archive organized by affected operating systems.
A resource and forum for exploits, tools and learning the basics of hacking.
Database of vulnerabilities in software.
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
Describes the attacks, provides a FAQ section and videos as well as proof-of-concept code for the Meltdown attack which affects Intel processors.
Open source penetration testing software with a large, active community.
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
A collection of disclosed exploits and vulnerabilities in various major software products.
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
A collection of security and exploit resources. Also has a large IRC community.
Describes the cross-privilege-boundary data sampling attack that affects Intel processors, includes a demo, a FAQ section and proof of concept code.
A resource and forum for exploits, tools and learning the basics of hacking.
Database of vulnerabilities in software.
Describes the speculative execution attack on Intel processors which allows an attacker to steal sensitive information. Includes a demo, proof of concept code, and questions and answers.
Describes the cross-privilege-boundary data sampling attack that affects Intel processors, includes a demo, a FAQ section and proof of concept code.
Describes the attacks, provides a FAQ section and videos as well as proof-of-concept code for the Meltdown attack which affects Intel processors.
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
A collection of security and exploit resources. Also has a large IRC community.
Open source penetration testing software with a large, active community.
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
A collection of disclosed exploits and vulnerabilities in various major software products.
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
A large and descriptive exploit archive organized by affected operating systems.
![](/img/curlies/Computers/legacy-computer.png)
Last update:
November 5, 2023 at 5:45:05 UTC
![](/img/art-leaf-sm.png)
Check out
Business: Business Services: Fire and Security: Security: Law Enforcement: Software
- Recently edited by shedragon
- Recently edited by shedragon