A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,521 - 3,540 of 5,809 in total
MS17-010 SMB RCE Detection
Created: May 30, 2018
module
Explore
SMTP Open Relay Detection
Created: May 30, 2018
module
Explore
Brocade Password Hash Enumeration
Created: May 30, 2018
module
Explore
ARRIS / Motorola SBG6580 Cable Modem SNMP Enumeration Module
Created: May 30, 2018
module
Explore
SNMP Enumeration Module
Created: May 30, 2018
module
Explore
SSH Public Key Login Scanner
Created: May 30, 2018
module
Explore
VMWare Web Login Scanner
Created: May 30, 2018
module
Explore
VMWare Screenshot Stealer
Created: May 30, 2018
module
Explore
WinRM Login Utility
Created: May 30, 2018
module
Explore
WinRM WQL Query Runner
Created: May 30, 2018
module
Explore
Android Mercury Browser Intent URI Scheme and Directory Traversal Vulnerability
Created: May 30, 2018
module
Explore
HTTP Client Basic Authentication Credential Collector
Created: May 30, 2018
module
Explore
Authentication Capture: MySQL
Created: May 30, 2018
module
Explore
Authentication Capture: POP3
Created: May 30, 2018
module
Explore
TeamViewer Unquoted URI Handler SMB Redirect
Created: August 19, 2020
module
Explore
WPAD.dat File Server
Created: May 30, 2018
module
Explore
Send Cisco Discovery Protocol (CDP) Packets
Created: May 30, 2018
module
Explore
mDNS Spoofer
Created: May 30, 2018
module
Explore
Alpha2 Alphanumeric Mixedcase Encoder
Created: May 30, 2018
module
Explore
Applocker Evasion - .NET Framework Installation Utility
Created: July 24, 2019
module
Explore