9 lines
577 B
Text
9 lines
577 B
Text
The Exploit Database is an archive of public exploits and corresponding
|
|
vulnerable software, developed for use by penetration testers and
|
|
vulnerability researchers. Its aim is to serve as the most comprehensive
|
|
collection of exploits, shellcode and papers gathered through direct
|
|
submissions, mailing lists, and other public sources, and present them
|
|
in a freely-available and easy-to-navigate database. The Exploit
|
|
Database is a repository for exploits and Proof-of-Concepts rather than
|
|
advisories, making it a valuable resource for those who need actionable
|
|
data right away.
|