- Exploit-Database got a face lift (and captcha removed) https://www.exploit-db.com/ 9 comments netsec
Linking pages
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/the-book-of-secret-knowledge 270 comments
- Security Begins at the Home Router https://insights.sei.cmu.edu/sei_blog/2018/07/security-begins-at-the-home-router.html 172 comments
- GitHub - future-architect/vuls: Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices https://github.com/future-architect/vuls 67 comments
- GitHub - ARPSyndicate/awesome-intelligence: A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources https://github.com/ARPSyndicate/awesome-intelligence 40 comments
- GitHub - offensive-security/exploitdb: The official Exploit Database repository https://github.com/offensive-security/exploit-database 22 comments
- thc-tips-tricks-hacks-cheat-sheet/README.md at master · hackerschoice/thc-tips-tricks-hacks-cheat-sheet · GitHub https://github.com/hackerschoice/thc-1001-tips-and-tricks/blob/master/readme.md 17 comments
- GitHub - mikeroyal/Open-Source-Security-Guide: Open Source Security Guide. Learn all about Security Standards, Frameworks, Threat Models, Encryption, and Benchmarks. https://github.com/mikeroyal/Open-Source-Security-Guide 11 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/awesome-ninja-admins 10 comments
- The Enchiridion of Impetus Exemplar https://shellsharks.com/threat-modeling 9 comments
- CVE, a key cybersecurity resource, is at risk inside and out http://www.sfchronicle.com/business/article/CVE-a-key-cybersecurity-resource-is-at-risk-7107509.php 7 comments
- GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more https://github.com/edoardottt/awesome-hacker-search-engines 4 comments
- Buffer Overflow Examples, Code execution by shellcode injection - protostar stack5 - 0xRick’s Blog https://0xrick.github.io/binary-exploitation/bof5/ 4 comments
- GitHub - bad-bit/mailpl0it: Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email if an exploit is found for the supplied query. http://github.com/bad-bit/mailpl0it 4 comments
- GitHub - iLabAcademy/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/iLabAcademy/the-book-of-secret-knowledge 4 comments
- GitHub - johackim/docker-hacklab: My personal hacklab, create your own. https://github.com/ston3o/docker-hacklab 3 comments
- Easy File Sharing Web Server v7.2 - Remote SEH Buffer Overflow (DEP Bypass With ROP) - Knapsy’s brain dump http://blog.knapsy.com/blog/2015/11/25/easy-file-sharing-web-server-v7-dot-2-remote-seh-buffer-overflow-dep-bypass-with-rop/ 3 comments
- GitHub - sundowndev/hacker-roadmap: A collection of hacking tools, resources and references to practice ethical hacking. https://github.com/sundowndev/hacker-roadmap 2 comments
- Impact of Shared Code on Vulnerability Patching - Tudor Dumitras https://www.umiacs.umd.edu/~tdumitra/blog/2015/04/15/impact-of-shared-code-on-vulnerability-patching/ 2 comments
- thc-tips-tricks-hacks-cheat-sheet/README.md at master · hackerschoice/thc-tips-tricks-hacks-cheat-sheet · GitHub https://github.com/hackerschoice/thc-tips-tricks-hacks-cheat-sheet/blob/master/README.md 2 comments
- GitHub - msd0pe-1/cve-maker: Tool to find CVEs, Exploits and Vulnerable Targets. https://github.com/msd0pe-1/cve-maker 1 comment
Related searches:
Search whole site: site:www.exploit-db.com
Search title: Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
See how to search.