Loading...
Computers & software — programming, internet, hardware, security, AI & more.
39644 resources
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
Describes the speculative execution attack on Intel processors which allows an attacker to steal sensitive information. Includes a demo, proof of concept code, and questions and answers.
A large and descriptive exploit archive organized by affected operating systems.
A resource and forum for exploits, tools and learning the basics of hacking.
Database of vulnerabilities in software.
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
Describes the attacks, provides a FAQ section and videos as well as proof-of-concept code for the Meltdown attack which affects Intel processors.
Open source penetration testing software with a large, active community.
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
A collection of disclosed exploits and vulnerabilities in various major software products.
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
A collection of security and exploit resources. Also has a large IRC community.
Describes the cross-privilege-boundary data sampling attack that affects Intel processors, includes a demo, a FAQ section and proof of concept code.