A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,781 - 3,800 of 5,755 in total
Android Screen Capture
Created: May 30, 2018
module
Explore
Android Root Remove Device Locks (root)
Created: May 30, 2018
module
Explore
iOS Image Gatherer
Created: March 19, 2019
module
Explore
BusyBox SMB Sharing
Created: May 30, 2018
module
Explore
BusyBox Download and Execute
Created: May 30, 2018
module
Explore
Linux Gather Container Detection
Created: May 30, 2018
module
Explore
Gather eCryptfs Metadata
Created: May 30, 2018
module
Explore
Phpmyadmin credentials stealer
Created: March 19, 2019
module
Explore
Linux Gather TOR Hidden Services
Created: May 30, 2018
module
Explore
Add a new user to the system
Created: October 25, 2023
module
Explore
Gather AWS EC2 Instance Metadata
Created: May 30, 2018
module
Explore
Multi Gather DbVisualizer Connections Settings
Created: May 30, 2018
module
Explore
Multi Gather DNS Service Record Lookup Scan
Created: May 30, 2018
module
Explore
Multi Gather Firefox Signon Credential Collection
Created: May 30, 2018
module
Explore
Multi Gather Pidgin Instant Messenger Credential Collection
Created: May 30, 2018
module
Explore
Multi Gather Ping Sweep
Created: May 30, 2018
module
Explore
Multi Generic Operating System Session Command Execution
Created: May 30, 2018
module
Explore
Write Messages to Users
Created: May 30, 2018
module
Explore
Multi Manage File Compressor
Created: May 30, 2018
module
Explore
OS X Gather Airport Wireless Preferences
Created: May 30, 2018
module
Explore