become an editor
the entire directory
only in Hacking/Exploits
Hacking and Security Consultants
Computers: Programming: Disassemblers
Computers: Software: Operating Systems: Unix: Security: Exploit Software
Society: Activism: Internet: Hacktivism
Canvas Exploit Platform
- A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
Exploiting Caller ID
- The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
Exploits Database by Offensive Security
- An archive of exploits and vulnerable software. The site collects exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.
Fyodor's Exploit World
- A large and descriptive exploit archive organized by affected operating systems.
- Well established resource and forum for exploits, tools and learning the basics of hacking.
High-Tech Bridge Security Research Lab
- Database of vulnerabilities in software.
- Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
- Open source penetration testing software with a large, active community.
Offensive Security Training
- Online security training based on the BackTrack Penetration Testing Linux Distribution. Also providing ethical hacking videos and pentesting demos.
- Place for Programmers and Hackers to hone their technical skills by completing challenging wargames and Programming Challenges. Including Network Programming, Defeating PaX, Buffer/Heap Overflows, Format Strings etc.
- Collection of older exploits and tools.
Rapid7 Vulnerability and Exploit Database
- A collection of disclosed exploits and vulnerabilities in various major software products.
- Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
- Archive of exploits and security advisories
- A collection of security and exploit resources. Also has a large IRC community.
" search on:
Copyright © 1998-2015 AOL Inc.
Visit our sister sites
Last update: July 6, 2015 at 17:39:46 UTC -