Utility:
Exploits Database is an exploit database located on the Offensive Security website. The database contains over 130,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.
Intelligent Exploit
Intelligent Exploit is an exploit database located on the Intelligent Exploit website. The database contains more than 10,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.
ShodanHQ
- ShodanHQ is an Internet search engine that specializes in Internet-connected devices. Shodan can be used to search for vulnerable devices, including servers, IP cameras and IoT devices.
- Shodan can be used to find exploits for vulnerable devices. To do this, Shodan's "Scan" function can be used to search for vulnerable devices. Once a vulnerable device has been found, Shodan's "Exploits" function can be used to search for exploits for that device.
PacketStorm Security
- PacketStorm Security is a website that offers a variety of security resources, including exploits, vulnerabilities and security tools.
- PacketStorm Security offers an exploit database containing over 100,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.
- Security research
- Penetration testing
- Malware development
Exploits Database is an exploit database located on the Offensive Security website. The database contains over 130,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.
Intelligent Exploit
Intelligent Exploit is an exploit database located on the Intelligent Exploit website. The database contains more than 10,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.
ShodanHQ
- ShodanHQ is an Internet search engine that specializes in Internet-connected devices. Shodan can be used to search for vulnerable devices, including servers, IP cameras and IoT devices.
- Shodan can be used to find exploits for vulnerable devices. To do this, Shodan's "Scan" function can be used to search for vulnerable devices. Once a vulnerable device has been found, Shodan's "Exploits" function can be used to search for exploits for that device.
PacketStorm Security
- PacketStorm Security is a website that offers a variety of security resources, including exploits, vulnerabilities and security tools.
- PacketStorm Security offers an exploit database containing over 100,000 exploits for a wide range of operating systems, applications and services. Exploits are organized by operating system, application and service, and are categorized according to severity.