Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,401 - 3,420 of 6,039 in total
Python Meterpreter, Python Bind TCP Stager
Created: May 30, 2018
module
Explore
Python Meterpreter, Python Reverse HTTP Stager
Created: May 30, 2018
module
Explore
Python Pingback, Bind TCP (via python)
Created: August 15, 2019
module
Explore
Python Pingback, Reverse TCP (via python)
Created: August 15, 2019
module
Explore
Solaris Command Shell, Find Port Inline
Created: May 30, 2018
module
Explore
Solaris Command Shell, Reverse TCP Inline
Created: May 30, 2018
module
Explore
Solaris Command Shell, Find Port Inline
Created: May 30, 2018
module
Explore
Multi Gather GnuPG Credentials Collection
Created: May 30, 2018
module
Explore
Multi Gather Run Shell Command Resource File
Created: May 30, 2018
module
Explore
Gather Tomcat Credentials
Created: May 30, 2018
module
Explore
Adi IRC Credential Gatherer
Created: May 17, 2024
module
Explore
Incredimail Credential Gatherer
Created: September 28, 2021
module
Explore
Maxthon Credential Gatherer
Created: September 28, 2021
module
Explore
Windows Gather Forensic Imaging
Created: May 30, 2018
module
Explore
FTP File Server
Created: May 30, 2018
module
Explore
F5 Configuration Importer
Created: September 14, 2020
module
Explore
Simple
Created: May 30, 2018
module
Explore
Simple
Created: November 01, 2024
module
Explore
Windows x64 Execute Command
Created: May 30, 2018
module
Explore
Reflective DLL Injection, Reverse Hop HTTP/HTTPS Stager
Created: May 30, 2018
module
Explore