Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,221 - 3,240 of 6,038 in total
Perl Command Encoder
Created: May 30, 2018
module
Explore
Powershell Base64 Command Encoder
Created: May 30, 2018
module
Explore
The EICAR Encoder
Created: May 30, 2018
module
Explore
XOR Encoder
Created: May 30, 2018
module
Explore
Hostname-based Context Keyed Payload Encoder
Created: July 23, 2019
module
Explore
Add/Sub Encoder
Created: May 30, 2018
module
Explore
Alpha2 Alphanumeric Mixedcase Encoder
Created: May 30, 2018
module
Explore
Alpha2 Alphanumeric Uppercase Encoder
Created: May 30, 2018
module
Explore
stat(2)-based Context Keyed Payload Encoder
Created: May 30, 2018
module
Explore
Single-byte XOR Countdown Encoder
Created: May 30, 2018
module
Explore
Register Service
Created: May 30, 2018
module
Explore
Alpha2 Alphanumeric Unicode Mixedcase Encoder
Created: May 30, 2018
module
Explore
Applocker Evasion - .NET Framework Installation Utility
Created: July 24, 2019
module
Explore
Applocker Evasion - MSBuild
Created: August 15, 2019
module
Explore
Applocker Evasion - Windows Presentation Foundation Host
Created: September 13, 2019
module
Explore
Applocker Evasion - Microsoft .NET Assembly Registration Utility
Created: September 19, 2019
module
Explore
Process Herpaderping evasion technique
Created: February 25, 2021
module
Explore
HTTP WebDAV Website Content Scanner
Created: May 30, 2018
module
Explore
Android Meterpreter, Android Reverse HTTPS Stager
Created: May 30, 2018
module
Explore
Android Meterpreter Shell, Reverse HTTP Inline
Created: May 30, 2018
module
Explore