A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 4,401 - 4,420 of 5,810 in total
OpenVPN Gather Credentials
Created: May 30, 2018
module
Explore
Gather AWS EC2 Instance Metadata
Created: May 30, 2018
module
Explore
Azure CLI Credentials Gatherer
Created: July 03, 2024
module
Explore
Gather Dbeaver Passwords
Created: January 12, 2023
module
Explore
Gather electerm Passwords
Created: August 28, 2024
module
Explore
Gather GRUB Password
Created: October 22, 2019
module
Explore
Multi Gather IRSSI IRC Password(s)
Created: May 30, 2018
module
Explore
Jboss Credential Collector
Created: May 30, 2018
module
Explore
UNIX Gather Remmina Credentials
Created: May 30, 2018
module
Explore
Multi Gather Resolve Hosts
Created: May 30, 2018
module
Explore
Multi Gather Mozilla Thunderbird Signon Credential Collection
Created: May 30, 2018
module
Explore
UNIX Gather Cached AD Hashes
Created: May 04, 2021
module
Explore
UNIX Gather Kerberos Tickets
Created: May 04, 2021
module
Explore
Multi Manage DbVisualizer Query
Created: May 30, 2018
module
Explore
Web browsers HSTS entries eraser
Created: June 14, 2018
module
Explore
Open a file or URL on the target computer
Created: July 25, 2018
module
Explore
Multi Manage Record Microphone
Created: May 30, 2018
module
Explore
Multi Manage the screensaver of the target computer
Created: July 25, 2018
module
Explore
Multiple Linux / Unix Post Sudo Upgrade Shell
Created: May 30, 2018
module
Explore
Multi Manage System Remote TCP Shell Session
Created: May 30, 2018
module
Explore