Database
Common keywords used to filter vulnerabilities
Specific CVE value
Software version number
Programming language
...
1. Exploit-DB
Searchsploit
A command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you, everywhere you go. It is available for offline use.
2. Rapid7 vulnerability & exploit database
3. Github
Some researchers may upload information about new vulnerabilites & exploits found to Github. It is a convenient place to store related information due to the relatively straightforward upload process.
The search tool can be used to filter repositories with particular keywords.
4. Collection of PoC for CVEs (Rhino Security)
Last updated