Cybersecurity Exploitation Resource

Browse 77 websites in this category • Page 4 of 4

Sites where Cybersecurity Exploitation Resource is a core feature are shown first, marked with a Core badge.

Promotion
millersmiles.co.uk favicon

See real phishing scams and spoof emails

Browse a large collection of phishing scams and spoof emails to stay informed and protect yourself from online fraud and email scams.

thunderclap.io favicon

Understand Thunderbolt security risks in seconds

Learn about Thunderclap vulnerabilities that let attackers exploit Thunderbolt ports to compromise computers, plus get technical details and security guidance.

httpoxy.org favicon

Understand and fix the httpoxy vulnerability

Learn about the httpoxy vulnerability in PHP and CGI apps, how it works, and how to protect your web applications from related security risks.

iotvillage.org favicon

Join interactive IoT hacking labs and contests

Explore IoT security at this event site offering expert talks, hands-on hacking labs, and live contests focused on the Internet of Things industry.

llm-attacks.org favicon

Discover real-world attacks on AI language models

Explore research on how language models can be attacked, with real examples, ethical considerations, and resources for understanding AI vulnerabilities.

offsec.almond.consulting favicon

Explore real-world offensive security case studies

Read in-depth articles and case studies on offensive security, bug bounties, and vulnerability research from the Almond security team.

0xsp.com favicon

Dive into hands-on security research and tutorials

Explore in-depth security research, technical analyses, and offensive cybersecurity tutorials focused on vulnerabilities, red teaming, and threat techniques.

dirtycow.ninja favicon

Explore Dirty COW vulnerability details and exploits

Learn about Dirty COW (CVE-2016-5195), a Linux privilege escalation vulnerability, with details, exploits, and resources for security researchers.

virusshare.com favicon

Access malware samples for security research

VirusShare.com is a large collection of malware samples and hashes for cybersecurity research, analysis, and education. Use with caution and expertise.

swarm.ptsecurity.com favicon

Deep dives into real-world hardware security flaws

Explore in-depth articles and research on hardware and software security, vulnerabilities, and exploits by the Positive Technologies Offensive Team.

cryptofails.com favicon

See real-world cryptography mistakes explained

Crypto Fails highlights examples of poor cryptography implementations, helping users learn from real-world mistakes in digital security.

thc.org favicon

Explore public IT security research and tools

The Hacker’s Choice shares IT security research and public cybersecurity projects, offering resources and insights for the tech and hacker community.

computest.nl favicon

Explore real-world cybersecurity exploit research

Sector 7 shares in-depth research and technical writeups on cybersecurity exploits, focusing on vulnerabilities in automotive and IoT devices.

hditower.com favicon

Alert for suspected phishing threats

A warning page indicating a suspected phishing site aiming to steal sensitive info by pretending to be trustworthy.

metasploit.com favicon

Test your system's security with Metasploit tools

Metasploit lets you test security by finding vulnerabilities and managing security assessments. Download penetration testing tools or learn how to use them.

packetstorm.news favicon

Stay updated with the latest cybersecurity news and tools

Packet Storm offers cybersecurity news, tools, exploits, advisories, and whitepapers for security professionals and enthusiasts to stay updated and informed.

put.as favicon

Discover reverse engineering tips for macOS

Explore reverse engineering tips, security tricks, and technical guides—especially for macOS—shared by an enthusiast passionate about software internals.