Search Now to Find Amazing Website on I Dmoz ORG

Exploits Websites

Exploits are demonstration software or techniques that illustrate a means of taking advantage of a vulnerability in order to cause software to behave other than expected.- Category ID : 55225
1 -

Security Focus

Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
2 -

Security Tracker

Archive of exploits and security advisories
3 -

Exploiting Caller ID

The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
4 -

Metasploit Framework

Open source penetration testing software with a large, active community.
5 -

HellBound Hackers

Well established resource and forum for exploits, tools and learning the basics of hacking.
6 -

Ill Mob

Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
7 -

Rapid7 Vulnerability and Exploit Database

A collection of disclosed exploits and vulnerabilities in various major software products.
8 -

Canvas Exploit Platform

A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
9 -

Offensive Security

Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
10 -

High-Tech Bridge: Security Advisories

Database of vulnerabilities in software.
11 -

Exploit Database

An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
12 -

SoldierX

A collection of security and exploit resources. Also has a large IRC community.
13 -

OverTheWire: WarGames

Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
14 -

Phenoelit

Collection of older exploits and tools.
Business
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts