Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 5,341 - 5,360 of 6,059 in total
Disable Windows Defender Signatures
Created: March 19, 2019
module
Explore
Windows Manage Inject in Memory Multiple Payloads
Created: May 30, 2018
module
Explore
Linux Execute Command
Created: May 30, 2018
module
Explore
Make Token Command
Created: June 08, 2023
module
Explore
Install OpenSSH for Windows
Created: February 03, 2020
module
Explore
Linux Meterpreter, Reverse HTTP Inline
Created: May 30, 2018
module
Explore
Install Python for Windows
Created: March 25, 2020
module
Explore
Windows Manage Certificate Authority Injection
Created: May 30, 2018
module
Explore
Windows Manage Proxy PAC File
Created: May 30, 2018
module
Explore
Linux Add User
Created: May 30, 2018
module
Explore
Linux Mettle x86, Find Tag Stager
Created: May 30, 2018
module
Explore
Windows PowerShell Execution Post Module
Created: May 30, 2018
module
Explore
Windows Gather Local User Account SID Lookup
Created: May 30, 2018
module
Explore
Windows Gather User Credentials (phishing)
Created: May 30, 2018
module
Explore
Windows Gather Process Memory Grep
Created: May 30, 2018
module
Explore
Windows Gather MobaXterm Passwords
Created: October 05, 2022
module
Explore
OSX Meterpreter, Bind TCP Stager
Created: June 14, 2018
module
Explore
OSX Meterpreter, Reverse HTTPS Inline
Created: May 30, 2018
module
Explore
OS X x64 Shell Bind TCP
Created: May 30, 2018
module
Explore
Mac OS X Inject Mach-O Bundle, Reverse TCP Stager
Created: May 30, 2018
module
Explore