Content deleted Content added
No edit summary Tags: Reverted Visual edit |
Mindmatrix (talk | contribs) m Reverted edit by 118.99.84.43 (talk) to last version by Slowking Man |
||
Line 1:
{{Short description|Security vulnerability database}}
{{Redirect| Exploit Database| exploit databases in general| Vulnerability database}}
'''ExploitDB''', sometimes stylized as '''Exploit Database''' or '''Exploit-Database''', is a public and open source [[vulnerability database]] maintained by [[Offensive Security]].<ref>{{Cite web |title=OffSec's Exploit Database Archive |url=https://www.exploit-db.com/ |access-date=2024-05-21 |website=www.exploit-db.com |language=en |archive-date=2016-07-29 |archive-url=https://web.archive.org/web/20160729184316/https://www.exploit-db.com/ |url-status=live }}</ref><ref
The database also contains [[proof-of-concepts]] (POCs), helping information security professionals learn new exploit variations. In ''Ethical Hacking and Penetration Testing Guide'', [[Rafay Baloch]] said Exploit-db had over 20,000 exploits, and was available in [[BackTrack Linux]] by default.<ref>{{Cite book|last=Baloch|first=Rafay|url=https://books.google.com/books?id=fKfNBQAAQBAJ&q=exploitdb&pg=PA136|title=Ethical Hacking and Penetration Testing Guide|date=2017-09-29|publisher=CRC Press|isbn=978-1-4822-3162-5|pages=135, 136, 137, 272, 431|language=en|access-date=2020-12-10|archive-date=2024-05-21|archive-url=https://web.archive.org/web/20240521145731/https://books.google.com/books?id=fKfNBQAAQBAJ&q=exploitdb&pg=PA136#v=snippet&q=exploitdb&f=false|url-status=live}}</ref> In ''CEH v10 Certified Ethical Hacker Study Guide'', Ric Messier called exploit-db a "great resource", and stated it was available within Kali Linux by default, or could be added to other [[Linux distributions]].<ref>{{Cite book|last=Messier|first=Ric|url=https://books.google.com/books?id=ATiZDwAAQBAJ&q=exploitdb&pg=PA243|title=CEH v10 Certified Ethical Hacker Study Guide|date=2019-06-25|publisher=John Wiley & Sons|isbn=978-1-119-53319-1|pages=235, 236, 243, 536, 547|language=en|access-date=2024-06-09|archive-date=2024-06-09|archive-url=https://web.archive.org/web/20240609003649/https://books.google.com/books?id=ATiZDwAAQBAJ&q=exploitdb&pg=PA243#v=snippet&q=exploitdb&f=false|url-status=live}}</ref>
Line 10:
== See also ==
{{Portal|Free and open-source software|Computer programming}}
* [[Offensive Security]]
* [[Offensive Security Certified Professional]]
Line 18 ⟶ 17:
<references />
== External links
* {{Official website}}
|