Sites like

exploit-db.com
Alternatives

  exploit-db.com

noimage.png

Stats

  Alexa Rank:  24449


  Popular in Country:  India


  Country Alexa Rank:   17988


 language:  


  Response Time:  


  SSL:  Enable


  Status:  up


Code To Txt Ratio

 Word Count  


 Links  


  ratio  


SSL Details

SSL Issuer:

Issuer:  Starfield Secure Certificate Authority - G2


Valid From:  2021-11-18 01:59:48


Expiration Date:   2022-12-17 11:12:53


SSL Organization:

Signature fd7250d14e1df01e2978dc772c2746a0a823978a


Algorithm: RSA-SHA256


Found 74 Top Alternative to Exploit-db.com

1
cvedetails.com.png

Cvedetails.com

CVE security vulnerability database. Security vulnerabilities, exploits, references and more

CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

2
packetstormsecurity.com.png

Packetstormsecurity.com

Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

3
rapid7.com.png

Rapid7.com

Cybersecurity & Compliance Solutions & Services | Rapid7

Supercharge your security impact with Rapid7, delivering shared visibility, analytics, and automation to unite security, IT, and DevOps teams.

4
acunetix.com.png

Acunetix.com

Acunetix | Web Application Security Scanner

Acunetix is an end-to-end web security scanner that offers a 360 view of an organization’s security. Allowing you to take control of the security of all you web applications, web services, and APIs to ensure long-term protection. Acunetix’s scanning engine is globally known and trusted for its unbeatable speed and precision.

6
shodan.io.png

Shodan.io

Shodan Search Engine

Search Engine for the Internet of Things

7
hackerone.com.png

Hackerone.com

HackerOne | #1 Trusted Security Platform and Hacker Program

Reduce your cybersecurity risk/vulnerabilities through bug bounty programs, VDPs, attack resistance management, attack surface management, security assessments, and pentest solutions.

8
noimage.png

Mitre.org

The MITRE Corporation

About Corporate Overview Our History Mission and Values Visiting MITRE Leadership Executive Team Board of Trustees Fellows Technical Fellows Visiting Fellows Awards and Recognition Corporate Social Responsibility Building a Foundation for the Future MITRE Staff Cultivates Los Angeles' Science Ecosystem Bringing Real World STEM to Students Building Partnerships and Diversity,...

10
portswigger.net.png

Portswigger.net

Web Application Security, Testing, & Scanning - PortSwigger

PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.

11
noimage.png

Vuldb.com

Vulnerability Database

Number one vulnerability database documenting and explaining security vulnerabilities, threats, and exploits since 1970.

12
hackingarticles.in.png

Hackingarticles.in

Hacking Articles - Raj Chandel's Blog

Raj Chandel's Blog

13
noimage.png

Vulners.com

Vulners - Vulnerability DataBase

Vulners - Vulnerability DataBase

14
cxsecurity.com.png

Cxsecurity.com

CXSECURITY.COM Free Security List

CXSECURITY (Independent information about security) is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.

15
tenable.com.png

Tenable.com

Tenable® - The Cyber Exposure Company

Welcome to the modern era of cyber exposure. Join the movement.

16
noimage.png

Owasp.org

OWASP Foundation | Open Source Foundation for Application Security

OWASP Foundation, the Open Source Foundation for Application Security on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.

17
tryhackme.com.png

Tryhackme.com

TryHackMe | Cyber Security Training

TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!

18
bugcrowd.com.png

Bugcrowd.com

#1 Crowdsourced Cybersecurity Platform | Bugcrowd

Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.

19
hackthebox.eu.png

Hackthebox.eu

Hack The Box: Hacking Training For The Best | Individuals & Companies

Where hackers level up! An online cybersecurity training platform allowing IT professionals to advance their ethical hacking skills and be part of a worldwide community. Join today and learn how to hack!

20
noimage.png

Netsparker.com

Invicti | Web Application Security For Enterprise

Get accurate, automated application security testing that scales like no other solution. Secure 1000s of web assets with less manual effort. Reduce your risk with the only…

21
kali.org.png

Kali.org

Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution

Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.

22
noimage.png

Cybersecurity-help.cz

Vulnerability Intelligence by CyberSecurity Help s.r.o.

Actionable vulnerability intelligence for every company.

23
noimage.png

Infosecinstitute.com

IT & Security Education, Certifications, Awareness & Phishing Simulator - Infosec

Infosec helps IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home.

24
nmap.org.png

Nmap.org

Nmap: the Network Mapper - Free Security Scanner

Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.

28
noimage.png

Vulmon.com

Vulmon - Vulnerability Intelligence Search Engine

Vulmon is a vulnerability and exploit search engine with vulnerability intelligence features.

29
0day.today.png

0day.today

0day.today Agreement - 0day.today Exploit Database : vulnerability : 0day : new exploits : buy and sell private exploit : shellcode by 0day Today Team

    0day Today is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals. Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database. This was written solely for educational purposes. Use it...

30
hackertarget.com.png

Hackertarget.com

28 Online Vulnerability Scanners & Network Tools | HackerTarget.com

Online Vulnerability Scanners to map the attack surface and identify vulnerabilities. 28 trusted open source security scanners and network tools.

31
viewdns.info.png

Viewdns.info

ViewDNS.info - Your one source for DNS related tools!

Reverse IP Lookup Find all sites hosted on a given server. Domain / IP Reverse Whois Lookup Find domain names owned by an individual or company. Registrant Name or Email Address IP History Show historical IP addresses for a domain. Domain (e.g. domain.com) DNS Report Provides a complete report on...

32
wonderhowto.com.png

Wonderhowto.com

Wonder How To » Fresh Hacks For a Changing World

Wonder How To is your guide to free how to videos on the Web. Search, Browse and Discover the best how to videos across the web using the largest how to video index on the web. Watch the best online video instructions, tutorials, & How-Tos for free. Have your own how to videos? Submit them to share with the world.

33
noimage.png

Sans.org

Cyber Security Training | SANS Courses, Certifications & Research

SANS Institute is the most trusted resource for cybersecurity training, certifications and research. Offering more than 60 courses across all practice areas, SANS trains over 40,000 cybersecurity professionals annually.

34
nist.gov.png

Nist.gov

National Institute of Standards and Technology | NIST

NIST promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

35
noimage.png

Dnsdumpster.com

DNSdumpster.com - dns recon and research, find and lookup dns records

Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.

37
getastra.com.png

Getastra.com

Astra Security - Comprehensive Suite Making Security Simple

Uncover vulnerabilities in your apps with our Pentest Suite. Protect your business in real time with Website Protection (Firewall & Malware Scanner)

38
blackhat.com.png

Blackhat.com

Black Hat | Home

Black Hat Webinars Security Research in Real Time June 30, 2022 - Managing Cybersecurity as a Business Risk July 14, 2022 - InfoSec Lessons from the War in Ukraine Sponsor a Webinars View all of our recent Webinars Black Hat Archives Watch Past Presentations View all of our archived videos...

39
noimage.png

Fortiguard.com

FortiGuard

View by Product Network Intrusion Protection Anti-Recon and Anti-Exploit Secure DNS IP Reputation/Anti-Botnet Indicators of Compromise IP Geolocation Service Cloud Workload Security Service Content and Endpoint Endpoint Detection & Response Anti-Virus Endpoint Vulnerability Device Detection ANN and NDR Sandbox Behavior Engine Application Web Filtering Anti-Spam Application Control Industrial Security Services...

40
crackstation.net.png

Crackstation.net

CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.

Crackstation is the most effective hash cracking service. We crack: MD5, SHA1, SHA2, WPA, and much more...

42
kitploit.com.png

Kitploit.com

KitPloit - PenTest & Hacking Tools

Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.

43
securityonline.info.png

Securityonline.info

Penetration Testing • Information Security

Securityonline is a huge security community. It is committed to the sharing of high-quality technical articles and safety reports, focusing on high-quality security and security incidents in the industry.

44
pentestlab.blog.png

Pentestlab.blog

Penetration Testing Lab – Offensive Techniques & Methodologies

Offensive Techniques & Methodologies

45
noimage.png

Vulnhub.com

Vulnerable By Design ~ VulnHub

VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.

46
kalilinuxtutorials.com.png

Kalilinuxtutorials.com

Kali Linux Tutorials - A Single Stop for Kali Linux Tools

Kali Linux tutorials is an independent platform that covers step by tutorials, advanced penetration testing, Ethical Hacking and network security tools.

47
metasploit.com.png

Metasploit.com

Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit

Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now.

49
noimage.png

Ripstech.com

Clean Code | Developer First | Sonar

Sonar’s industry leading solution enables developers and development teams to write clean code and remediate existing code organically, so they can focus on the work they love and maximize the value they generate for businesses.

50
hacknews.org.png

Hacknews.org

Hacknews.org Hack haber - Hack News - Güncel Haberler - Son dakika haberleri - Hacker news - Hacker haber - Hack haberleri ve Türk hack dünyasının kalbi burada atıyor - Hack tarihi , Hacker'ler , Gerçekler ve Hacker News / Hacker haber

Hack haberleri ve Türk hack dünyasının kalbi burada atıyor - Hack tarihi , Hacker'ler , Gerçekler ve Hacker News / Hacker haber

51
md5online.org.png

Md5online.org

MD5 Online | Free and fast MD5 encryption

MD5Online offers a free and fast tool to generate an MD5 hash from a word of your choice

53
base64decode.org.png

Base64decode.org

Base64 Decode and Encode - Online

Decode from Base64 format or encode into it with various advanced options. Our site has an easy to use online tool to convert your data.

54
noimage.png

Threatpost.com

Threatpost | The first stop for security news

Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.

55
cybrary.it.png

Cybrary.it

Free Cybersecurity Training and Career Development | Cybrary

Cybersecurity training from Cybrary will take your career to the next level. We have the cybersecurity courses that can help get you there!

56
noimage.png

Pentestmonkey.net

pentestmonkey | Taking the monkey work out of pentesting

mimikatz: Tool To Recover Cleartext Passwords From Lsass December 20, 2011, pentestmonkey I meant to blog about this a while ago, but never got round to it. Here’s a brief post about very cool feature of a tool called mimikatz. I’m very grateful to the tool’s author for bringing it...

58
veracode.com.png

Veracode.com

Confidently secure apps you build and manage with Veracode

This simple and scalable solution enables you to create more secure software so that you can boost your business and reduce risk without hindering innovation.

59
noimage.png

Tunnelsup.com

TunnelsUp - Tools and Information for Network Engineers

Tools, calculator, and helpful information for network engineering, web developers, and IT professionals.

62
md5decrypt.net.png

Md5decrypt.net

Md5 Decryption & Encryption Gratuite - Plus de 15.000.000.000 hashs

Decryption Md5 : Le Md5 (Message Digest 5) est une fonction cryptographique qui permet de "hasher" (encrypter) une séquence numérique en un hash md5 de 128 bits, soit 32 caractères, et ce peu importe la longueur de la séquence originale. Ce système cryptographique est irréversible, il n'est pas possible d'obtenir...

64
securityidiots.com.png

Securityidiots.com

Welcome to Security Idiots!!

Security Idiots is a place where some insane idiots try thier hands on with Security.

65
securitynewspaper.com.png

Securitynewspaper.com

Information Security News|Cyber Security|Hacking Tutorial

Information Security Newspaper covers cyber security news, data breaches, malware, hacking, vulnerabilities, mobile security & ethical hacking tutorials

66
darknet.org.uk.png

Darknet.org.uk

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

67
snyk.io.png

Snyk.io

Snyk | Developer security | Develop fast. Stay secure.

Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

69
noimage.png

1nj3ctor.com

1NJ3CTOR.COM - Hacking, security mirror analytics and reports.

Sorry for the inconvenience but we’re performing some maintenance at the moment. If you need to you can always contact us on [email protected], otherwise we’ll be back online shortly!

70
noimage.png

Asciinema.org

asciinema - Record and share your terminal sessions, the simple way

core/ca-certificates-utils 20210603-1 [instal.. │ Last Modified : Mon, 08 Ju core/coreutils 8.32-1 [installed] │ Out Of Date : No core/cracklib 2.9.7-2 [installed] │ core/crda 4.14-4 │ core/cronie 1.5.7-2 │ core/cryptsetup 2.4.0-1 [installed] │ core/curl 7.78.0-1 [installed] │ core/dash 0.5.11.4-1 │ core/db 5.3.28-5 [installed] │ core/dbus 1.12.20-1 [installed] │ core/dbus-docs 1.12.20-1...

71
noimage.png

Alertlogic.com

Managed Detection and Response (MDR) Company | Alert Logic

Alert Logic’s Managed Detection and Response platform provides 24/7 protection against constantly evolving cyber attacks. Protect your company now!

72
hashes.com.png

Hashes.com

Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online

Decrypt and crack your MD5, SHA1, SHA256, MySQL, and NTLM hashes for free online. We also support Bcrypt, SHA512, Wordpress and many more.

Technologies Used by exploit-db.com

Dns Records of exploit-db.com

A Record: 192.124.249.13
AAAA Record:
CNAME Record:
NS Record: ns-39-c.gandi.net ns-93-a.gandi.net ns-108-b.gandi.net
SOA Record: hostmaster.gandi.net
MX Record: alt1.aspmx.l.google.com aspmx2.googlemail.com alt2.aspmx.l.google.com aspmx.l.google.com aspmx3.googlemail.com
SRV Record:
TXT Record: v=spf1 a mx include:aspmx.googlemail.com include:_spf.google.com ~all
DNSKEY Record:
CAA Record: letsencrypt.org mailto:[email protected] godaddy.com

Whois Detail of exploit-db.com

Domain Name: exploit-db.com
Registry Domain ID: 1576318363_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.gandi.net
Registrar URL: http://www.gandi.net
Updated Date: 2021-10-19T19:21:31Z
Creation Date: 2009-11-19T21:12:26Z
Registrar Registration Expiration Date: 2022-11-19T22:12:26Z
Registrar: GANDI SAS
Registrar IANA ID: 81
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +33.170377661
Reseller:
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status:
Domain Status:
Domain Status:
Domain Status:
Registry Registrant ID: REDACTED FOR PRIVACY
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: Offensive Security
Registrant Street: REDACTED FOR PRIVACY
Registrant City: REDACTED FOR PRIVACY
Registrant State/Province:
Registrant Postal Code: REDACTED FOR PRIVACY
Registrant Country: GI
Registrant Phone: REDACTED FOR PRIVACY
Registrant Phone Ext:
Registrant Fax: REDACTED FOR PRIVACY
Registrant Fax Ext:
Registrant Email: [email protected]
Registry Admin ID: REDACTED FOR PRIVACY
Admin Name: REDACTED FOR PRIVACY
Admin Organization: REDACTED FOR PRIVACY
Admin Street: REDACTED FOR PRIVACY
Admin City: REDACTED FOR PRIVACY
Admin State/Province: REDACTED FOR PRIVACY
Admin Postal Code: REDACTED FOR PRIVACY
Admin Country: REDACTED FOR PRIVACY
Admin Phone: REDACTED FOR PRIVACY
Admin Phone Ext:
Admin Fax: REDACTED FOR PRIVACY
Admin Fax Ext:
Admin Email: [email protected]
Registry Tech ID: REDACTED FOR PRIVACY
Tech Name: REDACTED FOR PRIVACY
Tech Organization: REDACTED FOR PRIVACY
Tech Street: REDACTED FOR PRIVACY
Tech City: REDACTED FOR PRIVACY
Tech State/Province: REDACTED FOR PRIVACY
Tech Postal Code: REDACTED FOR PRIVACY
Tech Country: REDACTED FOR PRIVACY
Tech Phone: REDACTED FOR PRIVACY
Tech Phone Ext:
Tech Fax: REDACTED FOR PRIVACY
Tech Fax Ext:
Tech Email: [email protected]
Name Server: NS-93-A.GANDI.NET
Name Server: NS-108-B.GANDI.NET
Name Server: NS-39-C.GANDI.NET
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2022-06-16T15:27:18Z <<<

For more information on Whois status codes, please visit
https://www.icann.org/epp

Reseller Email:
Reseller URL:

Personal data access and use are governed by French law, any use for the purpose of unsolicited mass commercial advertising as well as any mass or automated inquiries (for any intent other than the registration or modification of a domain name) are strictly forbidden. Copy of whole or part of our database without Gandi's endorsement is strictly forbidden.
A dispute over the ownership of a domain name may be subject to the alternate procedure established by the Registry in question or brought before the courts.
For additional information, please contact us via the following form:
https://www.gandi.net/support/contacter/mail/