Browse 25 websites in this category • Page 1 of 2
Sites where Cybersecurity Exploitation Resource is a core feature are shown first, marked with a Core badge.
Explore a comprehensive database of public exploits, shellcode, and security research for ethical hacking, penetration testing, and cybersecurity learning.
Malpedia offers a free, searchable database of malware samples and information for cybersecurity research and analysis, maintained by Fraunhofer FKIE.
Learn about the Heartbleed Bug, a major security flaw in OpenSSL that exposed encrypted data. Find details, risks, and how to protect your information.
Browse and search archives of top security and hacking mailing lists, featuring real-time updates, message excerpts, and easy RSS access.
Phrack Magazine shares articles, research, and news about hacking, cybersecurity, and digital underground topics for tech enthusiasts and researchers.
BackTrack Linux was a popular security-focused operating system for penetration testing, now continued as Kali Linux. Site offers legacy info and links.
Irongeek.com offers tutorials, articles, and videos on information security, hacking, and pen-testing, helping users learn about cybersecurity topics and tools.
Explore legal and ethical hacking, security advisories, and independent research focused on information security and vulnerability disclosures.
Null Byte offers guides and tutorials on ethical hacking, cybersecurity, and pentesting for those interested in learning about security and white-hat hacking.
Explore hands-on hacking labs and resources for security researchers, bug hunters, and pentesters to learn, test, and share cybersecurity skills.
Vulnerability Lab shares research on security vulnerabilities, bug bounty programs, and responsible disclosure for ethical hackers and researchers.
Kitploit shares cybersecurity tools and resources for penetration testing, ethical hacking, and security research. Currently under maintenance.
Aircrack-ng offers a suite of tools for testing and analyzing WiFi network security, with downloads, documentation, and community support.
Explore in-depth articles on Windows internals, reverse engineering, and security research, with technical guides and insights for advanced developers and enthusiasts.
Learn about KRACK, a major Wi-Fi security vulnerability, with clear explanations, research papers, demos, and tools focused on WPA2 protocol weaknesses.
Learn about the Sweet32 cryptographic attack and its impact on 64-bit block ciphers used in protocols like TLS and OpenVPN. Security insights included.