Exploit Database

A CVE compliant archive of public exploits and corresponding vulnerable software

Description

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away. The Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web document that was crawled by a search engine that subsequently followed that link and indexed the sensitive information.
Vulnerability Research, Pen-Test, Find Exploits, Explore POC
Free
Share on facebook
Share on twitter
Share on linkedin
Share on reddit

Loved Exploit Database?

Join our monthly newsletter and get more tools and hacks straight to your mail!

Related Tools

Cyber

ZoomEy

China’s first and world-renowned cyberspace search engine Targeting global IPv4 and IPv6 addresses through a large number of global surveying and mapping nodes The database

Cyber

W3 Snoop

Snoop any website W3 Snoop enables you to spy on your favorite websites for free online. To get started, just enter any domain name in

Cyber

VirusTotal

Analyze suspicious files and URLs to detect types of malware, automatically VirusTotal inspects items with over 70 antivirus scanners and URL/domain blacklisting services, in addition

Cyber

ViewDNS

Your one source for free DNS related tools and information! The tools provided by ViewDNS.info allow users to gather a large amount of data about

Cyber

Threat Crowd

A Search Engine for Threats Search by Domain, IP, Email or Organization

Cyber

The Breached Database Directory

Information regarding security breaches Websites are hacked daily and their data is stolen by hackers. This data often contains the personal information of the registered

All Webint Tools

Search Engines

2lingual

Makes it easy to Google Search in 2 languages Get Google Search Results alongside Google

Company Research

Adbeat

Spy on Your Competitor’s Ad Strategies Discover your competitor’s most profitable publisher, ad copy and

Company Research

AdPlexity

Mobile, Desktop & Native Ads intelligence Keep Track of Your Competitor’s Most Profitable Ad Campaigns

Company Research

AdSector

Advertising Analytics Like Never Seen Before Filter ads by Affiliate Network and Tracking System and

Company Research

Adstxt.com

ads.txt files search Internet-wide crawl of ads.txt files aggregated into a single CSV. Wholesale replacement

Company Research

Advanced Web Ranking

Rank tracking made easy. Fresh rankings daily, weekly and on demand. For desktop, mobile and

Company Research

ahrefs

All-in-one SEO toolset Optimize your website, Analyze your competitors, Study what your customers are searching

People Research

ALBION SERVICES

Tinder profile search Everyone deserves to be in a loving relationship, but more importantly everyone

Too many tools to explore?

Add the Researcher to your chrome, and search all relevant sources at once

Automatically scan various sources for Company Details, Person Contacts, Social Analysis, Market Trends and more!

הצטרפו לקהילת האוסינט הגדולה בישראל!

check our new research tool

tradint.io

Conduct a full-scale Tradint (Trade Intelligence) investigation using the best tools and methods.

Insert a Company Name/URL/Sector/Location or any combination of them to get all the tools you need, grouped by context for your research