Jump to content

Draft:ExploitDB

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Robert McClenon (talk | contribs) at 02:55, 13 July 2024 (Declining submission: exists - Submission is duplicated by another article already in mainspace (AFCH)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
  • Comment: This draft is either essentially the same as the article with the same name, or a subset of the article with the same name. The draft will be replaced by a redirect from draft space to the article.
    Two copies of this page have been created, in draft space and in article space. It is not necessary to create two copies of the same page, and it annoys the reviewers.
    If the article either is ready for the encyclopedia or appears to be ready for the encyclopedia, the draft will be redirected to the article. However, the article could have been moved into article space instead.
    If the article does not appear to be ready for the encyclopedia, the article may be nominated for deletion, and the draft will be kept. Robert McClenon (talk) 02:55, 13 July 2024 (UTC)

ExploitDB, sometimes stylized as Exploit Database or Exploit-Database, is a public and open source vulnerability database maintained by Offensive Security.[1][2] While the database is publicly available via their website, the database can also be used by utilizing the searchsploit command-line tool which is native to Kali Linux.[3]

The database also contains proof-of-concepts (POC), helping information security professionals learn new exploits variations. In Ethical Hacking and Penetration Testing Guide, Rafay Baloch said Exploit-db had over 20,000 exploits, and was available in BackTrack Linux by default.[4] In CEH v10 Certified Ethical Hacker Study Guide, Ric Messier called exploit-db a "great resource," and stated it was available within Kali Linux by default, or could be added to other Linux distributions.[5]

The current maintainers of the database, Offensive Security, are not responsible for creating the database. The database was started in 2004 by a hacker group known as milw0rm[6] and has changed hands several times.[7]

See also

References

  1. ^ "OffSec's Exploit Database Archive". www.exploit-db.com. Retrieved 2024-05-21.
  2. ^ Clarke, Glen E. (2020-10-26). CompTIA PenTest+ Certification For Dummies. John Wiley & Sons. ISBN 978-1-119-63357-0.
  3. ^ Schultz, Corey P.; Perciaccante, Bob (2017-09-12). Kali Linux Cookbook. Packt Publishing Ltd. ISBN 978-1-78439-425-7.
  4. ^ Baloch, Rafay (2017-09-29). Ethical Hacking and Penetration Testing Guide. CRC Press. pp. 135, 136, 137, 272, 431. ISBN 978-1-4822-3162-5. Archived from the original on 2024-05-21. Retrieved 2020-12-10.
  5. ^ Messier, Ric (2019-06-25). CEH v10 Certified Ethical Hacker Study Guide. John Wiley & Sons. pp. 235, 236, 243, 536, 547. ISBN 978-1-119-53319-1.
  6. ^ "milw0rm productions - work in progress". 2004-05-08. Archived from the original on 2004-05-08. Retrieved 2024-05-21.
  7. ^ "Penetration Testing: Milw0rm / Str0ke Not Dead". seclists.org. Retrieved 2024-05-21.