Sites like

0day.today
Alternatives

  0day.today

0day.today Agreement - 0day.today Exploit Database : vulnerability : 0day : new exploits : buy and sell private exploit : shellcode by 0day Today Team

    0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals. Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database. This was written solely for educational purposes. Use it...

0day.today.png

Stats

  Alexa Rank: 


  Popular in Country: 


  Country Alexa Rank:  


 language:  


  Response Time:  0.277139


  SSL:  Enable


  Status:  up


Code To Txt Ratio

 Word Count  573


 Links  


  ratio  43.51785070321


SSL Details

SSL Issuer:

Issuer:  Cloudflare Inc ECC CA-3


Valid From:  2022-06-08 00:00:00


Expiration Date:   2023-06-07 23:59:59


SSL Organization:

Signature 7a6d32ef183007e27308c51ad9b1238ae7234e1e


Algorithm: ecdsa-with-SHA256


Found 74 Top Alternative to 0day.today

2
cxsecurity.com.png

Cxsecurity.com

CXSECURITY.COM Free Security List

CXSECURITY (Independent information about security) is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.

4
packetstormsecurity.com.png

Packetstormsecurity.com

Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

5
rapid7.com.png

Rapid7.com

Cybersecurity & Compliance Solutions & Services | Rapid7

Supercharge your security impact with Rapid7, delivering shared visibility, analytics, and automation to unite security, IT, and DevOps teams.

7
noimage.png

Zerodium.com

ZERODIUM - The Premium Exploit Acquisition Platform

ZERODIUM is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research. Our platform allows security researchers to sell their 0day (zero-day) exploits for the highest rewards.

10
noimage.png

Vuldb.com

Vulnerability Database

Number one vulnerability database documenting and explaining security vulnerabilities, threats, and exploits since 1970.

12
acunetix.com.png

Acunetix.com

Acunetix | Web Application Security Scanner

Acunetix is an end-to-end web security scanner that offers a 360 view of an organization’s security. Allowing you to take control of the security of all you web applications, web services, and APIs to ensure long-term protection. Acunetix’s scanning engine is globally known and trusted for its unbeatable speed and precision.

14
noimage.png

Mitre.org

The MITRE Corporation

About Corporate Overview Our History Mission and Values Visiting MITRE Leadership Executive Team Board of Trustees Fellows Technical Fellows Visiting Fellows Awards and Recognition Corporate Social Responsibility Building a Foundation for the Future MITRE Staff Cultivates Los Angeles' Science Ecosystem Bringing Real World STEM to Students Building Partnerships and Diversity,...

15
portswigger.net.png

Portswigger.net

Web Application Security, Testing, & Scanning - PortSwigger

PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.

16
xiaopan.co.png

Xiaopan.co

Main Navigation Menu Forums Xiaopan OS PRO XiaopanB Project Downloads Download Xiaopan OS Xiaopan OS Changelog Best Tiny Core Linux Apps How to Install Run in Virtual Machine Run From CD or DVD Run From USB Useful Linux Commands Modifying Xiaopan OS Change Language Wiki Help Xiaopan OS Xiaopan OS...

17
noimage.png

Vulners.com

Vulners - Vulnerability DataBase

Vulners - Vulnerability DataBase

19
noimage.png

Secnews24.com

secnews24.com

คาสิโนออนไลน์ คาสิโน ระดับโลก ที่น่าไปที่สุด Casino Beting บ่อนคาสิโนที่ใหญ่ที่สุดในโลก ที่เซียนพนันต้องรู้จัก คาสิโนออนไลน์ “Roulette”, “Blackjack”, “Baccarat”, “Slot Machine” ความสนุกและความตื่นเต้นเหล่านี้ ถูกรวบรวมไว้ในสถานที่ที่เรียกว่า “คาสิโน” น่าเสียดายที่คาสิโนยังไม่ได้รับการอนุญาตให้เปิดในเมืองไทย แต่ไม่ต้องเสียใจไป สำหรับใครที่คิดว่าตัวเองชอบและหลงใหลในการเสี่ยงโชค สล็อต 808 การเข้าไปท้าทายโชคชะตาของตนในคาสิโนนั้น เป็นสิ่งที่ไม่ควรพลาดและต้องลองให้ได้สักครั้งในชีวิต วันนี้เราได้รวบรวมมาให้แล้ว กับ 5 คาสิโน ระดับโลก ที่เรียกได้ว่าเป็น “สวรรค์ของนักเสี่ยงโชค” ซึ่งหากใครรู้ตัวว่าเป็นนักเสี่ยงโชคแล้วล่ะก็ ควรจะต้องหาเวลาไปเยี่ยมเยียนให้ได้สักครั้งก่อนตาย… 1. Venetian, Macao คาสิโนออนไลน์ หากพูดถึงสวรรค์ของนักเสี่ยงโชคในแถบเอเชียแล้วล่ะก็ คงหนีพ้น “มาเก๊า” เรียกได้ว่าเป็นเบอร์ 1ในย่านนี้เลยทีเดียว ในมาเก๊านั้นมีคาสิโนเยอะแยะมากมายหลายแห่ง ซึ่งในวันนี้เราจะพาทุกคนไปที่ The Venetian โดยที่นี่ไม่ได้มีแค่คาสิโนอย่างเดียวเท่านั้น เพราะที่นี่มีทั้งโรงแรม รีสอร์ท แหล่งช็อปปิ้งรวมทั้งความบันเทิงอีกสารพัด ซึ่งทั้งหมดนี้กินพื้นที่กว่า 980,000...

22
noimage.png

Exploitpack.com

Exploit Pack

Monthly subscription €200 Per Month - (1 user license) ✔ 39.000+ exploits ✖ Zero day exploits ✔ Adversary simulations ✔ Remote and local Fuzzer ✔ Web attacks ✔ Post-Exploitation ✔ Remote control ✔ Auto attacks ✔ Network scanner ✔ Targets management ✔ Hexa editor ✔ Reverse shells ✖ Live monthly...

23
noimage.png

Jetlib.com

Jetlib.com

Wi-Fizzle.com is now moved to wi-fizzle.jetlib.com! The official website for Jay Taylor is now located at jaytaylor.com :) my somewhat experimental journal automatically filtered news project streamlined meta security feed natural language processing (nlp) unix tips /revived December 2011/

24
noimage.png

Routerpwn.com

Routerpwn - One click exploits, generators, tools, news, vulnerabilities, poc, alerts

2015/09/29 Software Centrifuge Dropbox Centrifuge Dropbox automated vulnerability scanning for embedded devices. Tactical Network Solutions 2015/11/10 Software Router Security Features List List of security features to look for in routers. Michael Horowitz 2014/12/26 Hardware The Shikra The Shikra is a device that allows the user to interface (via USB) to...

25
cvedetails.com.png

Cvedetails.com

CVE security vulnerability database. Security vulnerabilities, exploits, references and more

CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

26
noimage.png

Circl.lu

CIRCL » CIRCL -- Computer Incident Response Center Luxembourg -- CSIRT -- CERT

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to gather, review, report and respond to computer security threats and incidents. CIRCL is the CERT (Computer Emergency Response Team/Computer Security Incident Response Team) for the private sector, communes and non-governmental entities in Luxembourg.

28
noimage.png

Malwareremovalservice.com

malwareremovalservice.com is for sale | HugeDomains

Get full access to this domain. Easy, seamless transactions. Zero percent financing available.

33
noimage.png

Zerodayinitiative.com

Home | Zero Day Initiative

RESEARCHERS Our goal is to encourage the reporting of zero day vulnerabilities responsibly to the affected vendors. RESEARCHER LOGIN VENDORS ZDI works collaboratively with affected vendors to notify the public of the vulnerability through a joint advisory. SEE HOW IT WORKS PRESS & CURIOSITY SEEKERS Read answers to some frequently...

34
noimage.png

Coresecurity.com

Core Security | Cyber Threat Prevention & Identity Governance

Contact Us Support All HelpSystems Products FREE TRIALS Contact Us Support All HelpSystems Products FREE TRIALS Cyber Threat Toggle Dropdown Products Core Impact Penetration testing software Cobalt Strike Red team software Event Manager Security information and event management Network Insight Network Traffic Analysis Powertech Antivirus Server-level virus protection Security Auditor...

35
noimage.png

Seclists.org

SecLists.Org Security Mailing List Archive

Security mailing list archive for the Nmap lists, Bugtraq, Full Disclosure, Security Basics, Pen-test, and dozens more. Search capabilities and RSS feeds with smart excerpts are available

36
noimage.png

Fortiguard.com

FortiGuard

View by Product Network Intrusion Protection Anti-Recon and Anti-Exploit Secure DNS IP Reputation/Anti-Botnet Indicators of Compromise IP Geolocation Service Cloud Workload Security Service Content and Endpoint Endpoint Detection & Response Anti-Virus Endpoint Vulnerability Device Detection ANN and NDR Sandbox Behavior Engine Application Web Filtering Anti-Spam Application Control Industrial Security Services...

37
noimage.png

Securityvulns.com

3proxy tiny free proxy server for Windows, Linux, Unix: SOCKS, HTTP, FTP proxy

× Few antiviral products inadequately detect 3proxy as Trojan.Daemonize, Backdoor.Daemonize, etc and many detect 3proxy as a PUA (potentially unwanted program). It may cause browser warning on download page. 3proxy is not trojan or backdoor and contains no functionality except described in documentation. Clear explanation of this fact is given,...

39
noimage.png

Gen.net.uk

GEN - IT Outsourcing, Support, Security & Software Development Services

Cyber Security, IT Outsourcing, Internet Access, Network & Infrastructure Security, Anti-virus & Anti-Spam, Groupware and messaging, Remote and onsite Technical Support and more.

42
noimage.png

0day.kiev.ua

0day.kiev.ua

Ñâåæèå ôèëüìû, ñåðèàëû, ïðîãðàììû. Ñêà÷àòü Microsoft Office 2019, Microsoft Windows 10, Adobe Photoshop CC 2019 | Ñâåæèå ôèëüìû â HD êà÷åñòâå, íîâûå èãðû è ïîïóëÿðíûå ïðîãðàììû

43
noimage.png

Bugsearch.net

Security Alert System - BugSearch.net

BugSearch is an information portal focused on applications security, web oriented and not. We offer our services to disclose our registered users on security alerts found on the net, in order to warn them as soon as possible on bugs, system flaws, exploits and threats afflicting applications and possible patches.

45
noimage.png

Security-database.com

Security Database

Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.

46
noimage.png

Phpsecure.info

* phpSecure.info - Welcome .. script, faille, hack, news, developpement, securité, open source php security related articles and vulnerabilities, vulnérabilités, by tobozo , frogman and calimero

PhpSecure.info :: Digging and spreading the latest php applications advisories and vulnerabilities since 2003, also maintaining a selection of articles and tutorials about PHP Security.

50
noimage.png

Geekwire.eu

GeekWire – Information, Cyber, Network Security News

The 5 best security cameras of 2022 25 June 2022 What is the best security camera? ZDNet’s … Tags IT, News SynLapse: Orca Security Publishes Details for Critical Azure Synapse Vulnerability 25 June 2022 In a recent article, Orca Security describes the technical details of SynLapse, a critical Synapse Analytics...

51
noimage.png

Legalhackers.com

Legal/ethical hacking. Information security.

Information Security. Legal / ethical hacking. Independent security research and security advisories.

52
noimage.png

Npulse.net

nPulse.net Official

Welcome to nPulse.net Latest Articles MSSQL Fail to start on newer hardware I recently faced with a strange issue with Microsoft Database Server.I used Bhyve as hypervisor and a Windows as Guest OS, tried to install MSSQL but failed with very "speaky" errors ... Click and Read More! DELL PERC...

53
noimage.png

Vulmon.com

Vulmon - Vulnerability Intelligence Search Engine

Vulmon is a vulnerability and exploit search engine with vulnerability intelligence features.

55
noimage.png

Cybersecurity-help.cz

Vulnerability Intelligence by CyberSecurity Help s.r.o.

Actionable vulnerability intelligence for every company.

56
noimage.png

Anquanke.com

安全客 - 安全资讯平台

安全客 - 安全资讯平台

57
noimage.png

Irfantoor.com

IrfanTOOR.com

Your daily dose of coffee with Irfan.

58
noimage.png

Exploitbox.io

ExploitBox.io - A playground & labs For Hackers, 0day Bug Hunters, Pentesters, Security Researchers

A playground & labs For Hackers, 0day Bug Hunters, Pentesters, Vulnerability Researchers & other security folks. Learn, share, pwn.

60
kitploit.com.png

Kitploit.com

KitPloit - PenTest & Hacking Tools

Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.

61
shodan.io.png

Shodan.io

Shodan Search Engine

Search Engine for the Internet of Things

62
noimage.png

Zero-day.cz

Free zero-day vulnerability tracking service - zero-day.cz

Free zero-day (0day) vulnerability tracking project.

65
noimage.png

Exploitzeroday.com

Exploit: Zero Day

Exploit: Zero Day is a cyberthriller with a living story where you roleplay as a hacktivist by making and solving puzzles. Created by Future Proof Games.

66
noimage.png

Sapsi.org

Inicio - Sapsi Consultores

Necessary Necessary Siempre activado Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. Cookie Duración Descripción cookielawinfo-checbox-analytics 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user...

67
noimage.png

Expku.com

The Exploit Database - Exploits, Shellcode, Vulnerability reports, 0days, remote exploits, local exploits, security articles, tutorials and more.

Technologies Used by 0day.today

  • Cloudflare Network Error Logging
  • PHP
  • Chart.js
  • Cloudflare Browser Insights
  • jQuery
  • Google Tag Manager
  • Google Analytics
  • FancyBox
  • web-vitals
  • Cloudflare
  • Dns Records of 0day.today

    A Record: 172.67.201.180 104.21.92.249
    AAAA Record: 2606:4700:3035::6815:5cf9 2606:4700:3037::ac43:c9b4
    CNAME Record:
    NS Record: ben.ns.cloudflare.com lily.ns.cloudflare.com
    SOA Record: dns.cloudflare.com
    MX Record:
    SRV Record:
    TXT Record:
    DNSKEY Record:
    CAA Record:

    Whois Detail of 0day.today

    Domain Name: 0DAY.TODAY
    Registry Domain ID: 27a55704e7b540149b5b51c771eaaa22-DONUTS
    Registrar WHOIS Server: whois.name.com
    Registrar URL: http://www.name.com
    Updated Date: 2022-04-04T09:30:20Z
    Creation Date: 2015-04-19T22:13:34Z
    Registrar Registration Expiration Date: 2023-04-19T22:13:34Z
    Registrar: Name.com, Inc.
    Registrar IANA ID: 625
    Reseller:
    Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
    Registry Registrant ID: Not Available From Registry
    Registrant Name: Whois Agent
    Registrant Organization: Domain Protection Services, Inc.
    Registrant Street: PO Box 1769
    Registrant City: Denver
    Registrant State/Province: CO
    Registrant Postal Code: 80201
    Registrant Country: US
    Registrant Phone: +1.7208009072
    Registrant Fax: +1.7209758725
    Registrant Email: https://www.name.com/contact-domain-whois/0day.today
    Registry Admin ID: Not Available From Registry
    Admin Name: Whois Agent
    Admin Organization: Domain Protection Services, Inc.
    Admin Street: PO Box 1769
    Admin City: Denver
    Admin State/Province: CO
    Admin Postal Code: 80201
    Admin Country: US
    Admin Phone: +1.7208009072
    Admin Fax: +1.7209758725
    Admin Email: https://www.name.com/contact-domain-whois/0day.today
    Registry Tech ID: Not Available From Registry
    Tech Name: Whois Agent
    Tech Organization: Domain Protection Services, Inc.
    Tech Street: PO Box 1769
    Tech City: Denver
    Tech State/Province: CO
    Tech Postal Code: 80201
    Tech Country: US
    Tech Phone: +1.7208009072
    Tech Fax: +1.7209758725
    Tech Email: https://www.name.com/contact-domain-whois/0day.today
    Name Server: ben.ns.cloudflare.com
    Name Server: lily.ns.cloudflare.com
    DNSSEC: unSigned
    Registrar Abuse Contact Email: [email protected]
    Registrar Abuse Contact Phone: +1.7203101849
    URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
    >>> Last update of WHOIS database: 2022-06-15T14:53:44Z <<<

    For more information on Whois status codes, please visit https://icann.org/epp


    The data in the Name.com, Inc. WHOIS database is provided by Name.com, Inc. for information purposes, and to assist persons in obtaining information about or related to a domain name registration record. Name.com, Inc. does not guarantee its accuracy. Users accessing the Name.com, Inc. WHOIS service agree to use the data only for lawful purposes, and under no circumstances may this data be used to: a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the registrar's own existing customers and b) enable high volume, automated, electronic processes that send queries or data to the systems of Name.com, Inc., except as reasonably necessary to register domain names or modify existing registrations. When using the Name.com, Inc. WHOIS service, please consider the following: the WHOIS service is not a replacement for standard EPP commands to the SRS service. WHOIS is not considered authoritative for registered domain objects. The WHOIS service may be scheduled for downtime during production or OT&E maintenance periods. Where applicable, the presence of a [Non-Public Data] tag indicates that such data is not made publicly available due to applicable data privacy laws or requirements. Access to non-public data may be provided, upon request, where it can be reasonably confirmed that the requester holds a specific legitimate interest and a proper legal basis, for accessing the withheld data. Access to this data can be requested by submitting a request via the form found at https://www.name.com/layered-access-request . Name.com, Inc. reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.