Search:
Go
English
Deutsch
Français
Japanese
Chinese Simplified
Chinese Traditional
Korean
Russian
Arabic
Česky
Greek
Italiano
Afrikaans
Aragonés
Armenian
Asturianu
Azerbaijani
Bahasa Indonesia
Bahasa Melayu
Bangla
Bashkir
Belarusian
Bosanski
Brezhoneg
Bulgarian
Català
Cymraeg
Dansk
Eesti
Español
Esperanto
Euskara
Frysk
Furlan
Føroyskt
Gaeilge
Gàidhlig
Galego
Gujarati
Hebrew
Hindi
Hrvatski
Interlingua
Íslenska
Kannada
Kaszëbsczi
Kazakh
Kiswahili
Kurdî
Kyrgyz
Latviski
Lëtzebuergesch
Lietuvių
Lingua Latina
Magyar
Makedonski
Marathi
Nederlands
Nordfriisk
Norsk
O'zbekcha
Occitan
Ossetian
Persian
Polski
Português
Punjabi Gurmukhi
Română
Rumantsch
Sardu
Seeltersk
Shqip
Sicilianu
Sinhala
Slovensko
Slovensky
Srpski
Suomi
Svenska
Tagalog
Taiwanese
Tamil
Tatarça
Telugu
Thai
Tiếng Việt
Türkçe
Türkmençe
Ukrainian
Urdu
Uyghurche
DMOZ Internet Directory
Presented by
DMOZLive.com
Home
About
Submit Site
Tweet
Home
Computers
Hacking
Exploits
15 Sites
Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.
Sites
[ Submit ]
Security Focus
- Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
Security Tracker
- Archive of exploits and security advisories
Fyodor's Exploit World
- A large and descriptive exploit archive organized by affected operating systems.
Exploiting Caller ID
- The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
Metasploit Framework
- Open source penetration testing software with a large, active community.
HellBound Hackers
- Well established resource and forum for exploits, tools and learning the basics of hacking.
Ill Mob
- Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
Rapid7 Vulnerability and Exploit Database
- A collection of disclosed exploits and vulnerabilities in various major software products.
Canvas Exploit Platform
- A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
Offensive Security
- Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
High-Tech Bridge: Security Advisories
- Database of vulnerabilities in software.
Exploit Database
- An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
SoldierX
- A collection of security and exploit resources. Also has a large IRC community.
OverTheWire: WarGames
- Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
Phenoelit
- Collection of older exploits and tools.
Click
[ Submit ]
above to Add a New Site, Update a Site, or Remove a Site from this Category.
See Also
Disassemblers
Computers : Programming
30 Sites
Exploit Software
Operating Systems : Unix : Security
5 Sites
Hacktivism
Society : Activism : Internet
4 Sites
Consultants
Computers : Security
315 Sites
This directory is made available through a Creative Commons Attribution license from the
DMOZ Organization.