Vulnerability Databases
Exploits Available
- Rootshell.
http://www.rootshell.com/
- Packet Storm
http://www.genocide2600.com/~tattooman/archives.shtml
- Bugtraq
http://www.geek-girl.com/bugtraq/
- Dop
's terribly geeky page of naughty hacks. http://www.geek-nation.com/~dop/
- The Legacy Hacking Archive II.
http://www.jabukie.com/ArchiveII.html
-
http://www.enslaver.com/exploit/
-
http://www.outpost9.com/exploits/
- Exploit World.
http://www.insecure.org/sploits_all.html
- INFILSEC Vulnerability Engine.
http://www.infilsec.com/vulnerabilities/
-
http://www.virtual-pc.com/spartan/plaguez/hc1.htm
- CERT Advisories. http://www.cert.org/advisories/
- Strout, B. 1998. Online Database Known NT Exploits.
-
http://www.emf.net/~ddonahue/NThacks/ntexploits.htm
- ISS X-Force.
http://www.iss.net/xforce/
- The Brotherhood of Darkness Exploit Archive.
http://www.ilf.net/brotherhood/filez/xploits.html
- Security Bugware.
http://161.53.42.3/~crv/security/bugs/Others/other.html
- Elitehackers.org.
http://www.elitehackers.org/Exploits/index.html
- Futher Kill Security Database.
http://users.succeed.net/~kill9/security/database/index.html
- Kao
’s UNIX Security Library. http://www.tacd.com/hack/index.html
-
http://www.cultdeadcow.com/~gauss/exploits/
-
http://get.your.exploits.org/
-
http://www.cs.iastate.edu/~ghelmer/unixsecurity/unix_vuln.html
- NegativeZero Exploit Page.
http://www.negativezero.com/exploits/
- Princeton University Secure Internet Programming Laboratory
http://www.cs.princeton.edu/sip/
- Center for Education and Research on Information Assurance and Security
- http://www.cerias.purdue.edu/
- Computer Operation, Audit and Security Technology
http://www.cs.purdue.edu/coast/