Database

Common keywords used to filter vulnerabilities

  1. Specific CVE value

  2. Software version number

  3. Programming language

  4. ...

1. Exploit-DB

Searchsploit

A command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you, everywhere you go. It is available for offline use.

2. Rapid7 vulnerability & exploit database

3. Github

Some researchers may upload information about new vulnerabilites & exploits found to Github. It is a convenient place to store related information due to the relatively straightforward upload process.

The search tool can be used to filter repositories with particular keywords.

4. Collection of PoC for CVEs (Rhino Security)

Last updated