Exploit Database
Curated archive of public exploits and proof-of-concepts with searchsploit CLI for offline lookup.
Why it is included
Transparency resource paired with patch verification—not a weapon without governance.
Best for
Researchers mapping CVEs to PoCs during remediation validation.
Strengths
- Huge corpus
- searchsploit
- CVE linkage
Limitations
- Unsafe to run unreviewed code; legal risk if misused
Good alternatives
Vendor advisories · Metasploit modules
Related tools
Security & Privacy
Metasploit Framework
Modular exploitation framework with payloads, encoders, auxiliaries, and integration points for exploit development.
Security & Privacy
Nmap
Network discovery and security auditing scanner with scripting (NSE) and OS fingerprinting.
Security & Privacy
OWASP ZAP
OWASP flagship web app scanner and proxy: automated checks, manual request tampering, scripting, and CI integrations.
Security & Privacy
sqlmap
Automatic SQL injection and database takeover helper with fingerprinting, data exfiltration, and OS-shell paths.
Security & Privacy
Nikto
Web server scanner that probes for dangerous files, outdated software, and misconfigurations via many checks.
Security & Privacy
Nuclei
Fast vulnerability scanner driven by YAML templates—used for recon, misconfigs, CVEs, and custom checks at scale.
