Search:
Home  About  Submit Site    
  
 
Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.
Sites [ Submit ]
Security Focus - Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs. Security Tracker - Archive of exploits and security advisories Fyodor's Exploit World - A large and descriptive exploit archive organized by affected operating systems. Exploiting Caller ID - The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID. Metasploit Framework - Open source penetration testing software with a large, active community. HellBound Hackers - Well established resource and forum for exploits, tools and learning the basics of hacking. Ill Mob - Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools. Rapid7 Vulnerability and Exploit Database - A collection of disclosed exploits and vulnerabilities in various major software products. Canvas Exploit Platform - A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test. Offensive Security - Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course. High-Tech Bridge: Security Advisories - Database of vulnerabilities in software. Exploit Database - An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database. SoldierX - A collection of security and exploit resources. Also has a large IRC community. OverTheWire: WarGames - Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings. Phenoelit - Collection of older exploits and tools.
Click [ Submit ] above to Add a New Site, Update a Site, or Remove a Site from this Category.
This directory is made available through a Creative Commons Attribution license from the DMOZ Organization.

© 2025 - Midnight Design Productions, LLC