Skip to content
OpenCatalogcurated by FLOSSK
Security & Privacy

Exploit Database

Curated archive of public exploits and proof-of-concepts with searchsploit CLI for offline lookup.

Why it is included

Transparency resource paired with patch verification—not a weapon without governance.

Best for

Researchers mapping CVEs to PoCs during remediation validation.

Strengths

  • Huge corpus
  • searchsploit
  • CVE linkage

Limitations

  • Unsafe to run unreviewed code; legal risk if misused

Good alternatives

Vendor advisories · Metasploit modules

Related tools