Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,361 - 3,380 of 6,038 in total
PHP Minify Encoder
Created: September 05, 2024
module
Explore
PPC LongXOR Encoder
Created: May 30, 2018
module
Explore
PPC LongXOR Encoder
Created: May 30, 2018
module
Explore
Dynamic key XOR Encoder
Created: March 19, 2019
module
Explore
Avoid underscore/tolower
Created: May 30, 2018
module
Explore
Call+4 Dword XOR Encoder
Created: May 30, 2018
module
Explore
Variable-length Fnstenv/mov Dword XOR Encoder
Created: May 30, 2018
module
Explore
Jump/Call XOR Additive Feedback Encoder
Created: May 30, 2018
module
Explore
Non-Alpha Encoder
Created: May 30, 2018
module
Explore
Non-Upper Encoder
Created: May 30, 2018
module
Explore
Single Static Bit
Created: May 30, 2018
module
Explore
Alpha2 Alphanumeric Unicode Uppercase Encoder
Created: May 30, 2018
module
Explore
Dynamic Key XOR Encoder
Created: March 19, 2019
module
Explore
Applocker Evasion - Microsoft Workflow Compiler
Created: September 11, 2019
module
Explore
Microsoft Windows Defender Evasive Executable
Created: March 19, 2019
module
Explore
Microsoft Windows Defender Evasive JS.Net and HTA
Created: March 19, 2019
module
Explore
Lotus Domino Password Hash Collector
Created: May 30, 2018
module
Explore
XOR Encoder
Created: May 30, 2018
module
Explore
HTTP WebDAV Website Content Scanner
Created: May 30, 2018
module
Explore
NetBIOS Name Service Spoofer
Created: May 30, 2018
module
Explore