10 lines
577 B
Text
10 lines
577 B
Text
|
The Exploit Database is an archive of public exploits and corresponding
|
||
|
vulnerable software, developed for use by penetration testers and
|
||
|
vulnerability researchers. Its aim is to serve as the most comprehensive
|
||
|
collection of exploits, shellcode and papers gathered through direct
|
||
|
submissions, mailing lists, and other public sources, and present them
|
||
|
in a freely-available and easy-to-navigate database. The Exploit
|
||
|
Database is a repository for exploits and Proof-of-Concepts rather than
|
||
|
advisories, making it a valuable resource for those who need actionable
|
||
|
data right away.
|