Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.

1. Original content only. Please do not post websites which only cover widely documented exploits or "review" them. Tutorials are okay.

2. Nothing illegal. Please only submit exploits or exploit-related sites which behave ethically.

3. No hacking consultants. Please post them in Computers: Security: Consultants in the relevant category.