Home > Computers > Hacking > Exploits
Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.
http://www.immunitysec.com/products/canvas/
A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
http://www.exploit-db.com/
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
http://www.artofhacking.com/orange.htm
The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
http://insecure.org/sploits.html
A large and descriptive exploit archive organized by affected operating systems.
http://www.hellboundhackers.org/
Well established resource and forum for exploits, tools and learning the basics of hacking.
https://www.htbridge.com/advisory/
Database of vulnerabilities in software.
http://www.illmob.org/
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
http://www.metasploit.com/
Open source penetration testing software with a large, active community.
http://www.offensive-security.com/
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
http://overthewire.org/wargames/
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
http://www.phenoelit.org/fr/tools.html
Collection of older exploits and tools.
http://www.rapid7.com/db/modules/
A collection of disclosed exploits and vulnerabilities in various major software products.
http://www.securityfocus.com/
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
http://securitytracker.com/
Archive of exploits and security advisories
http://www.soldierx.com/
A collection of security and exploit resources. Also has a large IRC community.
Home > Computers > Hacking > Exploits
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us