finds you similar websites
auto-suggest    top sites

Jun 18th, 2024

10 Popular Sites Like Exploit-db

The team has explored the web and uncovered a lot of excellent security and hacking sites like Exploit-db. Come by and check out websites that resemble Exploit-db.

Displaying 121 to 130 of 500 alternatives to Exploit-db. (Updated: Jun 18th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Exploit-db:
  Offensive Security Training presents - The Ex...
A great resource for penetration testers, vulnerability researchers, and ... Our aim is to collect exploits from submittals and mailing lists and concentrate ...
http://www.exploit-db.com/
popularity:
security
hacking
exploits
exploit
database
reference
hack
opensource
tools
linux
new search by a custom tag signature
  Hacking Techniques in Wireless Networks
This article is scheduled to appear in "The Handbook of Information Security" ... IEEE 802.11, wireless spoofing, cracking WEP, forged Deauthentication, ...
similarity:
popularity:
wireless
security
hacking
wifi
network
networking
hacks
howto
hack
reference
  Social Engineering - Security Through Education
Social Engineering - Exploiting Human Vulnerabilities ... This may include obtaining information, gaining access, or getting the target to take certain action. ...
similarity:
popularity:
security
hacking
socialengineering
social
engineering
hack
pentest
tools
framework
blog
  Web Application Hacking Sandbox
Welcome to the NTO Hackme Test Site. This is a support site for listeners of the Mighty Seek ... The Hands On Series is designed to give the step by step ...
similarity:
popularity:
hacking
security
sql
injection
tutorial
web
sandbox
guide
hack
tools
  Windows security tools and information - ntsecurity.nu
Advanced freeware Windows security tools and information. ... News from ntsecurity.nu. News from vidstrom.net © Arne Vidstrom. All rights reserved. ...
similarity:
popularity:
security
windows
hacking
tools
networking
software
freeware
hack
network
forensics
  Snort - the de facto standard for intrusion detection/prevention
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
  Remote Exploit Forums - Powered by vBulletin
Backtrack Remote-Exploit Forums ... Welcome to the Remote Exploit Forums. ... Sub-Forums: Discussioni Generali, Supporto Hardware, Supporto Software, Tutorial ...
similarity:
popularity:
security
hacking
backtrack
forum
linux
forums
wireless
wifi
tutorials
exploits
  Metasploit Unleashed - Mastering the Framework
This free information security training is brought to you in a community effort ... Through a heart-warming effort by several security professionals, we ...
similarity:
popularity:
metasploit
security
hacking
tutorial
reference
documentation
backtrack
training
software
tools
  ORK Home Page
Main Menu. Intro. News. Contacts. Send a Message. Curriculum Vitae. Amazon Wish List. My Stuff ... My Stuff. Documents. Software. Slides. Other Stuff. Security ...
similarity:
popularity:
security
exploit
hacking
  Information Leak
No information avaiable
similarity:
popularity:
hacking
security
howto
hack
tutorials
computer
reference
wireless
information
wifi
  Downloads
We request that you do not link to BackTrack images directly. Please use the links provided in this page. BackTrack 4 Final Release Last Update:
similarity:
popularity:
linux
security
backtrack
tools
hack
hacking
wifi
opensource
software
wireless
< prev 1 ... 11 12 13 14 15 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.