Computers Hacking Exploits
15
Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.

Subcategories 1

Related categories 3

Canvas Exploit Platform
A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
Exploit Database
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
Exploiting Caller ID
The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
Fyodor's Exploit World
A large and descriptive exploit archive organized by affected operating systems.
HellBound Hackers
Well established resource and forum for exploits, tools and learning the basics of hacking.
High-Tech Bridge: Security Advisories
Database of vulnerabilities in software.
Ill Mob
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
Metasploit Framework
Open source penetration testing software with a large, active community.
Offensive Security
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
OverTheWire: WarGames
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
Phenoelit
Collection of older exploits and tools.
Rapid7 Vulnerability and Exploit Database
A collection of disclosed exploits and vulnerabilities in various major software products.
Security Focus
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
Security Tracker
Archive of exploits and security advisories
SoldierX
A collection of security and exploit resources. Also has a large IRC community.
[Rogue Mozilla]
Last update:
February 2, 2016 at 3:42:11 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business