
Exploit Database - Exploits for Penetration Testers, Researchers, …
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...
Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform
About the Exploit Database
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.
Exploit Database Papers
Archived security papers and articles in various languages.
Exploit Database SearchSploit Manual
The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …
Exploit Database Statistics
The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …
Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
site:github.com "BEGIN OPENSSH PRIVATE KEY" - Exploit Database
Aug 23, 2024 · site:github.com "BEGIN OPENSSH PRIVATE KEY"Google Dork Description: site:github.com "BEGIN OPENSSH PRIVATE KEY"
Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
Feb 26, 2017 · Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation. CVE-2017-6074 . local exploit for Linux platform
Apache HTTP Server 2.4.49 - Exploit Database
Oct 6, 2021 · Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE). CVE-2021-41773 . webapps exploit for Multiple platform