Exploits
0-Day Exploits and Tutorials
DataStroghold.com Unveils how exploits and other hacking techniques are performed, in a clear and concise method. Frequently updated and always interesting.
Basics of Win32 Shatter Attacks
Step by step guide to privilege escalation using shatter attacks. Shatter Attacks use flaws within the Windows API call SetWindowLong() as well as others.
Canvas Exploit Platform
A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration…
Ethical Hacking Course
Commercial hacker training course on how to write and use exploits.
Exploiting Caller ID
The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
FrSIRT Exploits Archive
Archive of current 0day exploits from European and Asian sources. French and English language content provided.
Fyodor's Exploit World
A large and descriptive exploit archive organized by affected operating systems.
malware.com
A group that develops as well as discloses software exploits on many of the security mailing lists. Mainly specializing with Microsoft Office and Internet Explorer Vulnerabilitys.
Metasploit Project
The Metasploit Project is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature devel…
Network Security Archive
A collection of mailing list archives dealing with exploits, vulnerability development and hacking
PacketStorm Security
Packet Storm is a non-profit organization comprising computer security professionals that are dedicated to providing the information necessary to secure the networks world-wide. It…
Phrack.org Archives
Phrack is an underground ezine made by and for hackers that has been around since November 17, 1985. The magazine is open for contributions by anyone. Topics of interest are securi…
PullThePlug WarGames
Place for Programmers and Hackers to hone their technical skills by completing challenging wargames and Programming Challenges. Including Network Programming, Defeating PaX, Buffer…
Showing 20–20 of 27 results