A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,921 - 3,940 of 5,755 in total
Windows Meterpreter (Reflective Injection), Windows Reverse HTTPS Stager (winhttp)
Created: May 30, 2018
module
Explore
Windows Meterpreter Shell, Bind TCP Inline
Created: May 30, 2018
module
Explore
Add/Sub Encoder
Created: May 30, 2018
module
Explore
XOR Encoder
Created: May 30, 2018
module
Explore
Byte XORi Encoder
Created: May 30, 2018
module
Explore
Viproy CUCDM IP Phone XML Services - Call Forwarding Tool
Created: May 30, 2018
module
Explore
Windows Inject DLL, Windows x86 Bind Named Pipe Stager
Created: June 14, 2018
module
Explore
Windows Inject DLL, Bind TCP Stager (Windows x86)
Created: May 30, 2018
module
Explore
Windows Inject DLL, Reverse TCP Stager
Created: May 30, 2018
module
Explore
Asterisk Manager Login Utility
Created: May 30, 2018
module
Explore
Unix Command Shell, Reverse TCP (via Tclsh)
Created: March 28, 2020
module
Explore
mDNS Spoofer
Created: May 30, 2018
module
Explore
Python Exec, Python Meterpreter Shell, Bind TCP Inline
Created: March 16, 2022
module
Explore
Cross Platform Webkit File Dropper
Created: May 30, 2018
module
Explore
TFTP File Server
Created: May 30, 2018
module
Explore
Authentication Capture: SMB
Created: May 30, 2018
module
Explore
HTTP Client Automatic Exploiter
Created: May 30, 2018
module
Explore
HTTPS Fetch
Created: June 15, 2023
module
Explore
WinRM Login Utility
Created: May 30, 2018
module
Explore
VMware Server Directory Traversal Vulnerability
Created: May 30, 2018
module
Explore