Vulnerability Databases


Exploits Available

 Rootshell. http://www.rootshell.com/
 Packet Storm http://www.genocide2600.com/~tattooman/archives.shtml
 Bugtraq http://www.geek-girl.com/bugtraq/
 Dop's terribly geeky page of naughty hacks. http://www.geek-nation.com/~dop/
 The Legacy Hacking Archive II. http://www.jabukie.com/ArchiveII.html
 http://www.enslaver.com/exploit/
 http://www.outpost9.com/exploits/
 Exploit World. http://www.insecure.org/sploits_all.html
 INFILSEC Vulnerability Engine. http://www.infilsec.com/vulnerabilities/
 http://www.virtual-pc.com/spartan/plaguez/hc1.htm

 CERT Advisories. http://www.cert.org/advisories/
 Strout, B. 1998. Online Database Known NT Exploits.
http://www.emf.net/~ddonahue/NThacks/ntexploits.htm
 ISS X-Force. http://www.iss.net/xforce/
 The Brotherhood of Darkness Exploit Archive. http://www.ilf.net/brotherhood/filez/xploits.html
 Security Bugware. http://161.53.42.3/~crv/security/bugs/Others/other.html
 Elitehackers.org. http://www.elitehackers.org/Exploits/index.html
 Futher Kill Security Database. http://users.succeed.net/~kill9/security/database/index.html
 Kaos UNIX Security Library. http://www.tacd.com/hack/index.html
 http://www.cultdeadcow.com/~gauss/exploits/
 http://get.your.exploits.org/
 http://www.cs.iastate.edu/~ghelmer/unixsecurity/unix_vuln.html
 NegativeZero Exploit Page. http://www.negativezero.com/exploits/
 Princeton University Secure Internet Programming Laboratory
http://www.cs.princeton.edu/sip/
 Center for Education and Research on Information Assurance and Security
http://www.cerias.purdue.edu/
 Computer Operation, Audit and Security Technology
http://www.cs.purdue.edu/coast/