- Knowledge Base
- System & Network Scanning
- Scanning techniques
-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
-
Dashboard
What is Exploit-db Database?
Exploit-DB is a widely recognized online public database and platform that provides information about security vulnerabilities, exploits, and their corresponding proof-of-concept code.
The Exploit-DB database, maintained by Offensive Security, contains many vulnerabilities and associated exploits gathered from various sources, including disclosed vulnerabilities, research, and submissions from the security community. Each entry in the database typically includes details about the vulnerability, affected software or systems, technical descriptions, and relevant exploit code.
Holm Security Uses Exploit-DB as one of the sources of information about existing exploits for detected vulnerabilities.
To read more, you can visit the Exploit-DB website: https://www.exploit-db.com/ (external link)