Welcome! Log In


"The Exploit Database"
"The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database."

http://www.exploit-db.com/


2015-04-06 Exploit Code Downloads - Waiting verification w3tw0rk / Pitbull Perl IRC Bot Remote Code Execution PoC Exploit multiple Jay Turla
2015-04-06 Exploit Code Downloads - Verified JBoss Seam 2 File Upload and Execute jsp metasploit
2015-03-31 Exploit Code Downloads - Waiting verification Airties Air5650TT - Remote Stack Overflow multiple Batuhan Burakcin
2015-04-02 Exploit Code Downloads - Waiting verification Webgate WESP SDK 1.2 ChangePassword Stack Overflow windows Praveen Darshanam
2015-04-02 Exploit Code Downloads Download Vulnerable Application Waiting verification WebGate eDVR Manager 2.6.4 AudioOnlySiteChannel Stack Buffer Overflow windows Praveen Darshanam
2015-04-02 Exploit Code Downloads Download Vulnerable Application Waiting verification WebGate WinRDS 2.0.8 PlaySiteAllChannel Stack Buffer Overflow windows Praveen Darshanam
2015-04-02 Exploit Code Downloads Download Vulnerable Application Verified WebGate eDVR Manager 2.6.4 SiteChannel Property Stack Buffer Overflow windows Praveen Darshanam
Local Exploits
Date D A V Description Plat. Author
2015-03-28 Exploit Code Downloads - Waiting verification IDM 6.20 - Local Buffer Overflow windows TUNISIAN CYBER
2015-03-30 Exploit Code Downloads - Waiting verification BZR Player 1.03 - DLL Hijacking windows TUNISIAN CYBER
2015-03-30 Exploit Code Downloads - Waiting verification ZIP Password Recovery Professional 7.1 - DLL Hijacking windows TUNISIAN CYBER
2015-03-30 Exploit Code Downloads - Waiting verification HTTrack Website Copier 3.48-21 - DLL Hijacking windows TUNISIAN CYBER
2015-03-30 Exploit Code Downloads - Waiting verification UltraISO 9.6.2.3059 - DLL Hijacking windows TUNISIAN CYBER
2015-03-30 Exploit Code Downloads - Waiting verification Fedora 21 - setroubleshootd Local Root PoC linux Sebastian Krahmer
2015-03-26 Exploit Code Downloads Download Vulnerable Application Waiting verification Mini-stream Ripper 2.7.7.100 - Local Buffer Overflow windows TUNISIAN CYBER
Web Applications
Date D A V Description Plat. Author
2015-04-02 Exploit Code Downloads - Verified Wordpress Business Intelligence Plugin - SQL injection php Jagriti Sahu
2015-04-02 Exploit Code Downloads - Verified Joomla Spider Random Article Component - SQL Injection php Jagriti Sahu
2015-04-02 Exploit Code Downloads - Waiting verification Kemp Load Master 7.1.16 - Multiple Vulnerabilities multiple Roberto Suggi Liv.
2015-04-02 Exploit Code Downloads - Waiting verification Wordpress Video Gallery Plugin 2.8 - Multiple CSRF Vulnerabilities php Divya
2015-04-02 Exploit Code Downloads Download Vulnerable Application Verified Wordpress WP Easy Slideshow Plugin 1.0.3 - Multiple Vulnerabilities php Divya
2015-04-02 Exploit Code Downloads Download Vulnerable Application Verified Wordpress Simple Ads Manager Plugin - Multiple SQL Injection php ITAS Team
2015-04-02 Exploit Code Downloads - Waiting verification Wordpress Simple Ads Manager 2.5.94 - Arbitrary File Upload php ITAS Team
DoS/PoC
Date D A V Description Plat. Author
2015-03-19 Exploit Code Downloads Download Vulnerable Application Verified FastStone Image Viewer 5.3 - (.tga) Crash PoC windows ITDefensor Vulner.
2015-03-18 Exploit Code Downloads - Verified Fortinet Single Sign On - Stack Overflow windows Core Security
2015-03-14 Exploit Code Downloads - Waiting verification Intel Network Adapter Diagnostic Driver - IOCTL Handling Vulnerability windows Glafkos Charalamb.
2015-03-08 Exploit Code Downloads - Waiting verification Sagem F@st 3304-V2 - Telnet Crash PoC hardware Loudiyi Mohamed
2015-03-11 Exploit Code Downloads - Waiting verification Foxit Products GIF Conversion - Memory Corruption (LZWMinimumCodeSize) windows Francis Provenche.
2015-03-11 Exploit Code Downloads - Waiting verification Foxit Products GIF Conversion - Memory Corruption (DataSubBlock) windows Francis Provenche.
2015-03-11 Exploit Code Downloads - Waiting verification Microsoft Windows Text Services Memory Corruption (MS15-020) windows Francis Provenche.
Shellcode
Date D Description Plat. Author
2015-03-16 Exploit Code Downloads Shellcode Win x86-64 - Download & execute (Generator) windows Ali Razmjoo
2015-03-05 Exploit Code Downloads Linux/MIPS (Little Endian) - Chmod 666 /etc/passwd (55 Bytes) linux_mips Sang Min Lee
2014-03-27 Exploit Code Downloads x86_64 Shellcode (118 Bytes) - Reads Data From /etc/passwd To /tmp/outfile (118 bytes) lin_x86-64 Chris Higgins
2015-03-16 Exploit Code Downloads Shellcode - linux/x86 - ROT13 encoded execve("/bin/sh") (68 bytes) lin_x86 Maximiliano Gomez.
2015-03-16 Exploit Code Downloads Shellcode - Linux/x86 - chmod 0777 /etc/shadow obfuscated (84 bytes) lin_x86 Maximiliano Gomez.
2015-03-16 Exploit Code Downloads Shellcode - linux/x86 - Obfuscated - map google.com to 127.1.1.1 (98 bytes) lin_x86 Maximiliano Gomez.
2015-03-16 Exploit Code Downloads Shellcode - linux/x86 - Obfuscated execve("/bin/sh") (40 bytes) lin_x86 Maximiliano Gomez.
Papers
Date D Description Author
2015-04-03 Exploit Code Downloads [Hebrew] Digital Whisper Security Magazine #60 cp77fk4r & UnderW.
2015-03-22 Exploit Code Downloads PoC || GTFO 0x07 Rt. Revd. Dr.
2015-03-09 Exploit Code Downloads [Hebrew] Digital Whisper Security Magazine #59 cp77fk4r & UnderW.
2015-03-04 Exploit Code Downloads [TURKISH] Penetration and Security Testing on Microsoft SQL Server Halil Dalabasmaz
2015-02-13 Exploit Code Downloads [Hebrew] Digital Whisper Security Magazine #58 cp77fk4r & UnderW.
2015-02-09 Exploit Code Downloads Exploit-Sources (Part One) Flor Ian
2015-01-30 Exploit Code Downloads Ghost Vulnerability CVE-2015-0235 White Paper Rajivarnan


Recent Posts

WordPress TimThumb Exploitation
vbSEO – From XSS to Reverse PHP Shell
Owned and Exposed
Google Hacking Database Updates
Bypassing UAC with User Privilege under Windows Vista/7 – Mirror
Fuzzing vs Reversing – Round #2 (Reversing)
Fuzzing vs Reversing – Round #1 (Fuzzing)
vBulletin – A Journey Into 0day Exploitation
Sorry, only registered users may post in this forum.

Click here to login