A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,981 - 4,000 of 5,809 in total
Cisco Ironport Bruteforce Login Utility
Created: May 30, 2018
module
Explore
UDP Service Sweeper
Created: May 30, 2018
module
Explore
UDP Service Prober
Created: May 30, 2018
module
Explore
Redis Extractor
Created: April 29, 2021
module
Explore
Ruby On Rails File Content Disclosure ('doubletap')
Created: April 22, 2019
module
Explore
SMTP Simple Fuzzer
Created: May 30, 2018
module
Explore
Simple FTP Client Fuzzer
Created: May 30, 2018
module
Explore
DNS and DNSSEC Fuzzer
Created: May 30, 2018
module
Explore
Generic Emailer (SMTP)
Created: May 30, 2018
module
Explore
SMS Client
Created: May 30, 2018
module
Explore
Arista Configuration Importer
Created: August 20, 2020
module
Explore
Gadugadu credential gatherer
Created: September 28, 2021
module
Explore
Windows Gather Wireless Profile
Created: May 30, 2018
module
Explore
Windows Gather Local User Account Password Hashes (Registry)
Created: May 30, 2018
module
Explore
Solaris Gather Configured Services
Created: May 30, 2018
module
Explore
OpenVPN Gather Credentials
Created: May 30, 2018
module
Explore
Linux Gather Dump Password Hashes for Linux Systems
Created: May 30, 2018
module
Explore
BusyBox Enumerate Connections
Created: May 30, 2018
module
Explore
extracts subscriber info from target device
Created: March 19, 2019
module
Explore
Android Screen Capture
Created: May 30, 2018
module
Explore