Business Profile
Exploit Database provides a comprehensive archive of public exploits and corresponding vulnerable software for penetration testers and vulnerability researchers.
Penetration testers, researchers, and ethical hackers
Exploit Database is maintained by OffSec and is CVE compliant, offering a non-profit public service with a focus on providing actionable data through a vast collection of exploits and proof-of-concepts.
Immediate access upon visiting the site
An archive of public exploits and vulnerable software maintained by OffSec, designed for use by penetration testers and vulnerability researchers.
Penetration testers, vulnerability researchers, and security professionals
Exploit Database offers a vast, freely-available, and easily navigable collection of exploits, making it an indispensable resource for security professionals.
Requires JavaScript for full functionality
Free access
Based on matching: problems solved, target roles, key features, industries
core-hacked provides freelance development, design, and ethical hacking services.
Common Weakness Enumeration (CWE) provides a comprehensive list of software and hardware weaknesses to help developers and security professionals identify and mitigate potential vulnerabilities before deployment.
WeLiveSecurity provides award-winning news, views, and insights from the ESET security community, focusing on the latest threats and security trends.
Public Suffix List helps software, particularly web browsers, accurately manage domain names to prevent privacy issues and ensure proper functionality.
Microsoft Security Response Center (MSRC) helps protect customers and the broader ecosystem by engaging with security researchers and providing security updates and guidance.
Y Combinator helps startups make something people want by providing early-stage funding, mentorship, and a strong network.
Join 2,000+ professionals getting weekly sales intelligence updates from GoAgentic