🌐
Exploit-DB
exploit-db.com
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
archive of public exploits
Exploit Database
ExploitDB, sometimes stylized as Exploit Database or Exploit-Database, is a public and open source vulnerability database maintained by Offensive Security. It is one of the largest and most popular exploit databases in … Wikipedia
🌐
GitHub
github.com › topics › exploit-code
exploit-code · GitHub Topics · GitHub
when i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This repository contains all my codes which i released in public. bruteforce symlink php-backdoor exploit-code joomla-sql-injection
🌐
Tenouk
tenouk.com › Bufferoverflowc › Bufferoverflow6.html
The vulnerable and the exploit program examples using C programming language based on the SUID/GUID programs on Linux opensource machine with Intel microprocessor
Packet Storm Security : Contains x86 and non-x86 shellcode samples. Exploit writing tutorial. Sickle : shellcode development tools. exploit-db shellcode collection : Windows, Linux etc.
🌐
Akamai
akamai.com › blog › security research › the race to patch: attackers leverage sample exploit code in wordpress plug-in
The Race to Patch: Attackers Leverage Sample Exploit Code in WordPress Plug-in | Akamai
May 24, 2023 - The Akamai SIG analyzed XSS attack data and identified attacks starting within 24 hours of the exploit PoC being made public. What is particularly interesting about this is the query itself: The threat actor copied and used the Patchstack sample code from the write-up.
🌐
Javatpoint
javatpoint.com › exploiting-a-code-execution-vulnerability
Ethical Hacking | Exploiting a Code Execution Vulnerability - javatpoint
Server-side attacks - Metasploit basics In this section, we are going to look at the very simple exploit which is backdoor. We are choosing this exploit because we are going to look at a framework called Metasploit. Metasploit is an exploit development and execution tool.
🌐
CISA
cisa.gov › known-exploited-vulnerabilities-catalog
Known Exploited Vulnerabilities Catalog | CISA
2 weeks ago - TrueConf Client Download of Code Without Integrity Check Vulnerability: TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload.
🌐
GitHub
github.com › bbossola › vulnerability-java-samples
GitHub - bbossola/vulnerability-java-samples: Sample exploits of common vulnerabilities in Java librarires · GitHub
Sample exploits of common vulnerabilities in Java librarires - bbossola/vulnerability-java-samples
Starred by 27 users
Forked by 80 users
Languages   Java 97.2% | Shell 2.8%
🌐
Medium
ozguralp.medium.com › simple-remote-code-execution-vulnerability-examples-for-beginners-985867878311
Simple Remote Code Execution Vulnerability Examples for Beginners | by Ozgur Alp | Medium
April 12, 2020 - When I directly accessed the file created on my exploitation attempts above (in the picture, you can see it as /custom/svbGhtxS.php), it returned empty response, meaning that the file is actually created & exploit worked. After that, on the below code, I noticed that a special payload header is sent to the server from this file for full exploitation which is base64 encoded, via this code:
Find elsewhere
🌐
Computer Weekly
computerweekly.com › tutorial › Exploit-writing-tutorial-Part-1
Exploit writing tutorial: Part 1 | Computer Weekly
March 27, 2012 - Metasploit has many integrated payloads, which can help white-hat hackers. In the following installments of our exploit writing tutorial, we will learn how to generate shell code, encode them in various formats, and remotely access a system from our custom exploit code.
🌐
Medium
medium.com › @securitystreak › finding-the-right-exploit-code-968ad454824f
Finding the right exploit code. I am often looking for the right… | by Andrew Douma | Medium
January 2, 2020 - Compiled exploits can contain anything and the same warning applies when reusing existing payloads. Test all code in a monitored lab environment before you add it to your toolkit.
🌐
Wikipedia
en.wikipedia.org › wiki › Exploit_(computer_security)
Exploit (computer security) - Wikipedia
1 month ago - Examples are by the component targeted, or by vulnerability type. The most common is by how the exploit communicates to the vulnerable software. Another classification is by the action against the vulnerable system, such as: unauthorized data access; arbitrary code execution; and denial of service.
🌐
ScienceDirect
sciencedirect.com › science › article › abs › pii › S0164121222002539
ExploitGen: Template-augmented exploit code generation based on CodeBERT - ScienceDirect
December 1, 2022 - In this section, we want to further investigate when ExploitGen generates the wrong exploit code. To explore the limitations of ExploitGen, we count all the samples of semantical errors in the generated exploit code and manually summarize the error code generated by ExploitGen into four error ...
🌐
GitHub
github.com › topics › exploits
exploits · GitHub Topics · GitHub
This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation.
🌐
SecurityScorecard
securityscorecard.com › home › what is an exploit? understanding vulnerabilities and threat mitigation
What Is an Exploit? Understanding Vulnerabilities and Threat Mitigation - SecurityScorecard
May 19, 2025 - Example of a zero-day (or 0day): In a notorious incident that demonstrated cybersecurity incidents’ ability to have physical impacts, Stuxnet, a computer worm, used zero-day vulnerabilities to disable Iranian nuclear centrifuges at the Natanz facility. Logic Flaws Exploit weaknesses in application design or business logic. Example of logic flaws: Reapplying discount codes repeatedly in an e-commerce platform.
🌐
OffSec
offsec.com › metasploit-unleashed › exploit-targets
Metasploit Unleashed | Exploit Targets
Sample Target Code for an Exploit Module: 'Targets' => [ # Windows 2000 – TARGET = 0 [ 'Windows 2000 English', { 'Rets' => [ 0x773242e0 ], }, ], # Windows XP - TARGET = 1 [ 'Windows XP English', { 'Rets' => [ 0x7449bf1a ], }, ], ], 'DefaultTarget' => 0)) a11y.text Target Options Block ·
🌐
Null Byte
null-byte.wonderhowto.com › how-to › hack-like-pro-build-your-own-exploits-part-2-writing-simple-buffer-overflow-c-0159478
Hack Like a Pro: How to Build Your Own Exploits, Part 2 (Writing a Simple Buffer Overflow in C) :: Null Byte
January 9, 2015 - I have developed a small bit of code that will enable us to overflow a memory buffer and run our own commands on the system. It is not meant to be used as an exploit, but rather to simply demonstrate the principle of buffer overflows that we will be building into our zero-day exploit.
🌐
OffSec
offsec.com › home › cyberversity › exploit development 101
What is exploit development? Exploit Development 101 | OffSec
September 4, 2025 - Explore the world of exploit development and reverse engineering; learn all about vulnerabilities, CVEs, exploit techniques and shellcodes and payloads, as well as the value of exploit development training.
🌐
Stackaware
blog.stackaware.com › p › what-do-exploit-exploitable-and-exploit
What do exploit, exploitable, and exploit code mean in cybersecurity terms?
February 24, 2023 - For example, I have noted that 10% or less of Common Vulnerabilities and Exposures (CVEs) are exploitable in any given configuration. In the relevant article, however, I included studies regarding the public availability of exploit code, the exploitability of vulnerabilities, and the percentage ...