finds you similar websites
auto-suggest    top sites

Nov 19th, 2024

10 Popular Sites Like Exploit-db

The team has explored the web and uncovered a lot of excellent security and hacking sites like Exploit-db. Come by and check out websites that resemble Exploit-db.

Displaying 21 to 30 of 500 alternatives to Exploit-db. (Updated: Nov 19th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Exploit-db:
  Offensive Security Training presents - The Ex...
A great resource for penetration testers, vulnerability researchers, and ... Our aim is to collect exploits from submittals and mailing lists and concentrate ...
http://www.exploit-db.com/
popularity:
security
hacking
exploits
exploit
database
reference
hack
opensource
tools
linux
new search by a custom tag signature
  Irongeek.com
Irongeek's Information Security site with tutorials, articles and other information. ... In other news, Irongeek.com was a nominee for "Best Technical Blog' at the ...
similarity:
popularity:
security
hacking
tutorial
hack
linux
geek
computer
tools
howto
tutorials
  ha.ckers.org web application security lab
Then she saw the ha.ckers.org logo, to which I said, "Don't worry, we were just ... So you've seen ha.ckers.org on Google's own machines at a security conference - where ...
similarity:
popularity:
security
hacking
blog
web
programming
internet
tools
reference
hack
xss
  BindShell.Net: Home
A bindshell is a remote shell connection, similar to the connection a telnet client preforms to a telnet server. Any operating system supporting a TCP stack and a ...
similarity:
popularity:
security
hacking
exploits
tools
hack
shell
pentest
tool
xss
web
  FrSIRT 24/24 & 7/7 - Centre de Recherche et de Veille en Sécurité Informatique
VUPEN Security provides vulnerability management and intelligence solutions (advisories, analysis, exploits)
similarity:
popularity:
security
exploits
vulnerabilities
hacking
news
sécurité
linux
windows
hack
vulnerability
  Uninformed
In August 2008 Verizon Wireless released a firmware upgrade for their xv6800 ... In particular, support for accessing the device's built-in Qualcomm gpsOne ...
similarity:
popularity:
security
hacking
programming
magazine
exploits
reverse-engineer
hack
journal
blog
windows
  Remote-Exploit.org - Supplying offensive security products to the world
A weak password might be very short or only use alphanumeric characters, making ... A weak password can also be one that is easily guessed by someone profiling the ...
similarity:
popularity:
security
linux
hacking
tools
livecd
hack
wifi
wireless
network
backtrack
  SecurityFocus
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and ...
similarity:
popularity:
security
news
hacking
technology
network
internet
tech
computer
linux
reference
  National Vulnerability Database Home
Comprehensive CVE vulnerability database that integrates all U.S. Government publicly available vulnerability resources. ...
similarity:
popularity:
security
vulnerability
database
reference
government
hacking
vulnerabilities
computer
tools
internet
  CAU GHQ
No information avaiable
similarity:
popularity:
security
hacking
news
reference
hack
exploits
tutorial
freeware
hacker
infosec
  SecGuru
Remember the good old days, when all you needed was a phone number and maybe a ... And on top of all that we've added LinkedIn and Facebook accounts and ...
similarity:
popularity:
security
tools
hacking
news
network
infosec
exploits
linux
blog
vulnerabilities
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.