- Knowledge base
- Network & System Security
- Scanning techniques
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What is Exploit-db Database?
Exploit-DB is a widely recognized online public database and platform that provides information about security vulnerabilities, exploits, and their corresponding proof-of-concept code.
The Exploit-DB database, maintained by Offensive Security, contains many vulnerabilities and associated exploits gathered from various sources, including disclosed vulnerabilities, research, and submissions from the security community. Each entry in the database typically includes details about the vulnerability, affected software or systems, technical descriptions, and relevant exploit code.
Holm Security Uses Exploit-DB as one of the sources of information about existing exploits for detected vulnerabilities.
To read more, you can visit the Exploit-DB website: https://www.exploit-db.com/ (external link)