Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 5,281 - 5,300 of 6,043 in total
Windows Gather Mikrotik Winbox "Keep Password" Credentials Extractor
Created: January 10, 2024
module
Explore
Windows Gather AutoLogin User Credential Extractor
Created: May 30, 2018
module
Explore
Ruby Pingback, Bind TCP
Created: August 15, 2019
module
Explore
Ruby Command Shell, Bind TCP IPv6
Created: May 30, 2018
module
Explore
Metasploit Web Crawler
Created: May 30, 2018
module
Explore
SSH Version Corruption
Created: May 30, 2018
module
Explore
Byte XORi Encoder
Created: May 30, 2018
module
Explore
FTP Authentication Scanner
Created: May 30, 2018
module
Explore
HTTP trace.axd Content Scanner
Created: May 30, 2018
module
Explore
Wowza Streaming Engine Manager Login Utility
Created: March 07, 2023
module
Explore
The "none" Encoder
Created: May 30, 2018
module
Explore
SNMP Windows Username Enumeration
Created: May 30, 2018
module
Explore
BSD Command Shell, Find Tag Inline
Created: May 30, 2018
module
Explore
BloXor - A Metamorphic Block Based XOR Encoder
Created: May 30, 2018
module
Explore
TFTP Fetch
Created: February 20, 2025
module
Explore
Register Service
Created: May 30, 2018
module
Explore
Applocker Evasion - .NET Framework Installation Utility
Created: July 24, 2019
module
Explore
Unix Command Shell, Reverse TCP (via Python)
Created: May 30, 2018
module
Explore
Powershell Exec, Reverse TCP Stager (IPv6)
Created: May 11, 2022
module
Explore
The EICAR Encoder
Created: May 30, 2018
module
Explore