Vulnerability Databases
Exploits Available
Rootshell. http://www.rootshell.com/
Packet Storm http://www.genocide2600.com/~tattooman/archives.shtml
Bugtraq http://www.geek-girl.com/bugtraq/
Dop 's terribly geeky page of naughty hacks. http://www.geek-nation.com/~dop/
The Legacy Hacking Archive II. http://www.jabukie.com/ArchiveII.html
http://www.enslaver.com/exploit/
http://www.outpost9.com/exploits/
Exploit World. http://www.insecure.org/sploits_all.html
INFILSEC Vulnerability Engine. http://www.infilsec.com/vulnerabilities/
http://www.virtual-pc.com/spartan/plaguez/hc1.htm
CERT Advisories. http://www.cert.org/advisories/
Strout, B. 1998. Online Database Known NT Exploits.
-
http://www.emf.net/~ddonahue/NThacks/ntexploits.htm
ISS X-Force. http://www.iss.net/xforce/
The Brotherhood of Darkness Exploit Archive. http://www.ilf.net/brotherhood/filez/xploits.html
Security Bugware. http://161.53.42.3/~crv/security/bugs/Others/other.html
Elitehackers.org. http://www.elitehackers.org/Exploits/index.html
Futher Kill Security Database. http://users.succeed.net/~kill9/security/database/index.html
Kao ’s UNIX Security Library. http://www.tacd.com/hack/index.html
http://www.cultdeadcow.com/~gauss/exploits/
http://get.your.exploits.org/
http://www.cs.iastate.edu/~ghelmer/unixsecurity/unix_vuln.html
NegativeZero Exploit Page. http://www.negativezero.com/exploits/
Princeton University Secure Internet Programming Laboratory
http://www.cs.princeton.edu/sip/
Center for Education and Research on Information Assurance and Security - http://www.cerias.purdue.edu/
Computer Operation, Audit and Security Technology
http://www.cs.purdue.edu/coast/