EXPLOITS DATABASE

C4rmel1xx

Active member
Member
Joined
1 yrs. 9 mth. 30 days
Messages
31
Reaction score
1
Wallet
0$
Utility:
  • Security research
  • Penetration testing
  • Malware development
Exploits Database
Please, Log in or Register to view URLs content!

Exploits Database is an exploit database located on the Offensive Security website. The database contains over 130,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.

Intelligent Exploit
Please, Log in or Register to view URLs content!

Intelligent Exploit is an exploit database located on the Intelligent Exploit website. The database contains more than 10,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.

ShodanHQ
Please, Log in or Register to view URLs content!

- ShodanHQ is an Internet search engine that specializes in Internet-connected devices. Shodan can be used to search for vulnerable devices, including servers, IP cameras and IoT devices.
- Shodan can be used to find exploits for vulnerable devices. To do this, Shodan's "Scan" function can be used to search for vulnerable devices. Once a vulnerable device has been found, Shodan's "Exploits" function can be used to search for exploits for that device.

PacketStorm Security
Please, Log in or Register to view URLs content!


- PacketStorm Security is a website that offers a variety of security resources, including exploits, vulnerabilities and security tools.
- PacketStorm Security offers an exploit database containing over 100,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.
 
Top Bottom