[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Exploit

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
602
Security Risk Critical
R
D
Download
C
CVE-2022-3405
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
319
Security Risk Critical
R
D
Download
C
CVE-2024-42365
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
529
Security Risk Critical
R
D
Download
C
CVE-2024-47575
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
618
Security Risk Critical
R
D
Download
C
CVE-2024-47076
CVE-2024-47175
CVE-2024-47176
CVE-2024-47177
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
485
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
834
Security Risk Critical
R
D
Download
C
CVE-2023-28324
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
517
Security Risk Critical
R
D
Download
C
CVE-2024-28185
CVE-2024-28189
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
950
Security Risk Critical
R
D
Download
C
CVE-2024-28397
CVE-2024-39205
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
1 094
Security Risk Critical
R
D
Download
C
CVE-2024-24809
CVE-2024-5910
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
1 582
Security Risk Critical
R
D
Download
C
CVE-2024-2961
CVE-2024-34102
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
1 350
Security Risk Critical
R
D
Download
C
CVE-2024-45256
CVE-2024-45257
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
1 953
Security Risk Critical
R
D
Download
C
CVE-2023-45249
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 043
Security Risk Critical
R
D
Download
C
CVE-2024-24809
CVE-2024-31214
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 043
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jeremy Brown
Exploits:
61
BusinessLevel:
11
2 720
Security Risk Critical
R
D
Download
C
CVE-2024-8517
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 516
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mor!p3r
Exploits:
2
BusinessLevel:
6
2 807
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jean Pereira
Exploits:
2
BusinessLevel:
1
3 202
Security Risk Critical
R
D
Download
C
CVE-2024-3116
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 754
Security Risk Critical
R
D
Download
C
CVE-2024-5932
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 200
Security Risk Critical
R
D
Download
C
CVE-2024-42845
Verified by 0day Admin
free
You can open this exploit for free
Alessio Romano
Exploits:
2
BusinessLevel:
0

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
448
Security Risk Medium
R
D
Download
C
CVE-2024-50066
Verified by 0day Admin
free
You can open this exploit for free
Jann Horn
Exploits:
29
BusinessLevel:
7
3 894
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
 
0.105
Open this exploit for 0.105 BTC
Open this exploit for 9 800 GOLD
Cas
Exploits:
1
BusinessLevel:
0
1 707
Security Risk High
R
D
Download
C
CVE-2023-0386
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
1 633
Security Risk Medium
R
D
Download
C
CVE-2024-42259
Verified by 0day Admin
free
You can open this exploit for free
Jann Horn
Exploits:
29
BusinessLevel:
7
2 056
Security Risk High
R
D
Download
C
CVE-2024-30038
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 867
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 571
Security Risk High
R
D
Download
C
CVE-2020-27796
Verified by 0day Admin
free
You can open this exploit for free
ii4gsp
Exploits:
1
BusinessLevel:
0
4 107
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
5 239
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
6 149
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
5 688
Security Risk Critical
R
D
Download
C
CVE-2023-46944
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
6 082
Security Risk Critical
R
D
Download
C
CVE-2024-21338
Verified by 0day Admin
free
You can open this exploit for free
E1 Coders
Exploits:
2
BusinessLevel:
0
6 176
Security Risk High
R
D
Download
C
CVE-2023-32479
Verified by 0day Admin
free
You can open this exploit for free
Amirhossein Bahramizadeh
Exploits:
20
BusinessLevel:
2
5 734
Security Risk Critical
R
D
Download
C
CVE-2023-37466
Verified by 0day Admin
free
You can open this exploit for free
Calil Khalil
Exploits:
1
BusinessLevel:
0
5 959
Security Risk High
R
D
Download
C
CVE-2024-1346
Verified by 0day Admin
free
You can open this exploit for free
Peter Gabaldon
Exploits:
2
BusinessLevel:
1
5 805
Security Risk Critical
R
D
Download
C
CVE-2024-28121
Verified by 0day Admin
free
You can open this exploit for free
ixts
Exploits:
1
BusinessLevel:
0
6 465
Security Risk Critical
R
D
Download
C
CVE-2024-23749
Verified by 0day Admin
free
You can open this exploit for free
DEFCESCO
Exploits:
4
BusinessLevel:
1
6 036
Security Risk High
R
D
Download
C
Verified by 0day Admin
free
You can open this exploit for free
DEFCESCO
Exploits:
4
BusinessLevel:
1
5 959
Security Risk High
R
D
Download
C
CVE-2024-25003
Verified by 0day Admin
free
You can open this exploit for free
DEFCESCO
Exploits:
4
BusinessLevel:
1
7 633
Security Risk Low
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
bot
Exploits:
156
BusinessLevel:
13

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
376
Security Risk High
R
D
Download
C
CVE-2024-37383
Verified by 0day Admin
free
You can open this exploit for free
AmirZargham
Exploits:
3
BusinessLevel:
1
10 029
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
cybersploit
Exploits:
1
BusinessLevel:
0
1 114
Security Risk Critical
R
D
Download
C
CVE-2024-51567
Verified by 0day Admin
free
You can open this exploit for free
bot
Exploits:
156
BusinessLevel:
13
1 647
Security Risk High
R
D
Download
C
CVE-2024-27956
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
10 259
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Chokri Hammedi
Exploits:
21
BusinessLevel:
2
2 948
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Emiliano Febbi
Exploits:
3
BusinessLevel:
1
898
Security Risk Critical
R
D
Download
C
CVE-2024-8504
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
819
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
bRpsd
Exploits:
9
BusinessLevel:
5
1 214
Security Risk High
R
D
Download
C
CVE-2024-44000
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
2 482
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hosein Vita
Exploits:
6
BusinessLevel:
2
2 341
Security Risk Critical
R
D
Download
C
CVE-2021-20090
Verified by 0day Admin
free
You can open this exploit for free
Simon Greenblatt
Exploits:
1
BusinessLevel:
0
1 831
Security Risk High
R
D
Download
C
CVE-2024-6205
Verified by 0day Admin
free
You can open this exploit for free
j3r1ch0123
Exploits:
1
BusinessLevel:
0
507
Security Risk Medium
R
D
Download
C
CVE-2024-40422
Verified by 0day Admin
free
You can open this exploit for free
Alperen Ergel
Exploits:
17
BusinessLevel:
3
2 560
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
ohnoisploited
Exploits:
1
BusinessLevel:
0
1 698
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jerry Thomas
Exploits:
2
BusinessLevel:
0
2 117
Security Risk Critical
R
D
Download
C
CVE-2024-4577
Verified by 0day Admin
free
You can open this exploit for free
Yesith Alvarez
Exploits:
1
BusinessLevel:
0
2 104
Security Risk Critical
R
D
Download
C
CVE-2024-5084
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
1 510
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 520
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 304
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 563
Security Risk Critical
R
D
Download
C
CVE-2024-38063
Verified by 0day Admin
free
You can open this exploit for free
Photubias
Exploits:
13
BusinessLevel:
5
2 628
Security Risk Medium
R
D
Download
C
CVE-2024-39486
Verified by 0day Admin
free
You can open this exploit for free
Jann Horn
Exploits:
29
BusinessLevel:
7
7 336
Security Risk Medium
R
D
Download
C
CVE-2024-27686
Verified by 0day Admin
free
You can open this exploit for free
ice-wzl
Exploits:
1
BusinessLevel:
0
10 246
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Anish Feroz
Exploits:
3
BusinessLevel:
1
12 812
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Talson
Exploits:
2
BusinessLevel:
1
11 774
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
766
BusinessLevel:
48
11 903
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Diyar Saadi
Exploits:
4
BusinessLevel:
1
12 058
Security Risk Medium
R
D
Download
C
CVE-2023-31419
Verified by 0day Admin
free
You can open this exploit for free
Touhami Kasbaoui
Exploits:
6
BusinessLevel:
2
10 983
Security Risk Medium
R
D
Download
C
CVE-2023-6246
Verified by 0day Admin
free
You can open this exploit for free
Qualys Security Advisory
Exploits:
8
BusinessLevel:
4
11 002
Security Risk Medium
R
D
Download
C
CVE-2023-6246
Verified by 0day Admin
free
You can open this exploit for free
Qualys Security Advisory
Exploits:
8
BusinessLevel:
4
10 380
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Georgi Guninski
Exploits:
16
BusinessLevel:
11
9 919
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3
7 231
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3
4 768
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3
3 935
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jann Horn
Exploits:
29
BusinessLevel:
7
3 087
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3
3 184
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Georgi Guninski
Exploits:
16
BusinessLevel:
11
2 988
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3
3 125
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3
3 012
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fernando Mengali
Exploits:
26
BusinessLevel:
3

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
13 712
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Taurus Omar
Exploits:
138
BusinessLevel:
14
12 251
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Angel Injection
Exploits:
134
BusinessLevel:
14
11 396
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
25
6 480
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Gerry Eisenhaur
Exploits:
1
BusinessLevel:
7
6 486
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Net.Edit0r
Exploits:
38
BusinessLevel:
9
6 334
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Michael Lynn
Exploits:
1
BusinessLevel:
10
4 109
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
lion
Exploits:
6
BusinessLevel:
10