All the Internet

Internet Directory - Top : Computers : Hacking : Exploits

Top : Computers : Hacking : Exploits (19 web sites)
Hacking and Security Consultants
 Related Categories
Computers: Programming: Disassemblers
Computers: Software: Operating_Systems: Unix: Security: Exploit_Software
Society: Activism: Internet: Hacktivism
 Related Web Pages

Canvas Exploit Platform
A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.

Exploit Database
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.

Exploiting Caller ID
The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.

Fyodor's Exploit World
A large and descriptive exploit archive organized by affected operating systems.

HellBound Hackers
Well established resource and forum for exploits, tools and learning the basics of hacking.

High-Tech Bridge: Security Advisories
Database of vulnerabilities in software.

Ill Mob
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.

Metasploit Framework
Open source penetration testing software with a large, active community.

Offensive Security
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.

OverTheWire: WarGames
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.

Collection of older exploits and tools.

Rapid7 Vulnerability and Exploit Database
A collection of disclosed exploits and vulnerabilities in various major software products.

Security Focus
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.

Security Tracker
Archive of exploits and security advisories

A collection of security and exploit resources. Also has a large IRC community.