Skip to content

๐Ÿ•ท๏ธ Exploit Resources โ€‹

These resources are for legal pentesting purposes

You are responsible of your own actions and the damage they cause.

๐Ÿ“š Attack Techniques โ€‹

  • Mitre Att&ck โ€“ Database knowledge to help tactics and attacks techniques.

๐Ÿ”“ Public Exploit โ€‹

  • Packet Storm โ€“ A large collection of public security exploits, vulnerability reports, and patches.
  • VulnCheck - CVEs browser, resources to exploit.
  • Sploitus - Exploit databases (CVE, PoC and more).
  • Seebug โ€“ Public exploits with PoC code examples.

Repositories โ€‹

๐Ÿ”Ž CVE Search Engines โ€‹

  • Shodan CVE DB โ€“ Exploit search integrated with Shodan, providing CVE and exposed services data.
  • Vulners โ€“ A search engine that helps identify vulnerabilities and exploits.
  • feedly - References CVE and find articles about it.
  • Rapid7 Vulnerability Database โ€“ Search and explore vulnerabilities.

๐Ÿ› ๏ธ Rootkit โ€‹