The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
Exploit Database (Exploit-DB) is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. It aims to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.
30000 / day
50000 / day
3.5 pages per visit
Domain Rating
Domain Authority
Citation Level
English, etc
A vast collection of exploits and vulnerabilities, meticulously categorized and searchable.
Ensures that all entries are compliant with the Common Vulnerabilities and Exposures (CVE) standard.
Allows researchers and hackers to submit their own exploits and vulnerabilities directly to the database.
Advanced search functionality to find specific exploits or vulnerabilities by various criteria.
Includes not just advisories but also proof-of-concepts, providing actionable data for immediate use.
Aggregates exploits and vulnerabilities from various public mailing lists and sources.
Encourages community participation by allowing users to contribute to the database's growth.
The database is regularly updated with new exploits and vulnerabilities to keep users informed.
Serves as an educational tool for those learning about cybersecurity and exploit development.
Provides API access for developers to integrate Exploit-DB data into their own applications.
Exploit-DB is owned and maintained by Offensive Security, a leading provider of cybersecurity training and certification.
The site includes a legal disclaimer stating that the information provided is for educational purposes only and should not be used for illegal activities.
Exploit-DB has community guidelines that encourage responsible disclosure and ethical use of the information provided.
The database is freely accessible to anyone, but API access and some advanced features may require registration or subscription.
Offensive Security offers courses and certifications, such as the OSCP (Offensive Security Certified Professional), that utilize Exploit-DB as a resource.
Security headers report is a very important part of user data protection. Learn more about http headers for exploit-db.com