About 73,300 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.

  3. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …

  4. You would get the response message: “The target appears to be vulnerable.” We already know that, but just to check again. Now to get the meterpreter shell on the target’s system, simply …

  5. Microsoft Windows 7/8.1/2008 R2/2012 R2/2016 R2 ... - Exploit …

    Jul 11, 2017 · Additionally, the exploit does the information leak to check transactions alignment before doing OOB write. So this exploit should never crash a target against Windows 7 and later.

  6. Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...

    Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform

  7. Online Book Store 1.0 - Unauthenticated Remote Code Execution

    Jan 8, 2020 · Online Book Store 1.0 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform

  8. vsftpd 2.3.4 - Backdoor Command Execution - Unix remote Exploit

    Apr 12, 2021 · vsftpd 2.3.4 - Backdoor Command Execution. CVE-2011-2523 . remote exploit for Unix platform

  9. Now we know that we can exploit unserialize() function in node-serialize module, if untrusted data passed into it. Let’s exploit the vulnerability in the web application to spawn a reverse shell.

  10. Exploit Database Submission Guidelines

    Want to submit your exploit to us? Here’s what you need to know. We deal with dozens of submissions a day, verifying, testing and cataloging the exploits we receive. When possible, …