Domain Summary

exploit-db.com

the exploit database - exploits, shellcode, 0days, remote exploits, local exploits, web apps, vulnerability reports, security articles, tutorials and more.

Sucuri WebSite Firewall - Access Denied

Global rank: #86703
Daily visitors: 22.08K
Monthly Visits: 662,453
Pageviews per user: 2.96
Registrar Abuse Contact Email: [email protected]
Registrant Phone:
Rating
TLD: com
IP Address: 192.124.249.13
Organization: Sucuri
Category: Computers Electronics and Technology >
Computer Security
exploit-db.com Icon
exploit-db.com
Last Status:
Online
Last Updated: 8 day ago
loading

About Website

Click here to check amazing exploitdb content for United States. Otherwise, check out these important facts you probably never knew about exploit-db.com

the exploit database - exploits, shellcode, 0days, remote exploits, local exploits, web apps, vulnerability reports, security articles, tutorials and more.

Visit exploit-db.comRight Arrow
Trust Score DNS Competitors Traffic SSL HTTP Headers WHOIS Reviews SEO

exploit-db.com Trust Score

exploit-db.com is probably legit as the trust score is reasonable. Our algorithm rated exploit-db.com a 97. Although our rating of exploit-db.com is medium to low risk, we encourage you to always vote as the evaluation of the site is done automatically.

The trust rating is high. Might be safe.
Trustscore
97 / 100

What is your feeling about exploit-db.com?

rating 10
rating 20
rating 31
rating 41
rating 50
3.5 / 5 Based on 2 Reviews
View/Add Comments

Which Sites are Alternatives & Competitors to exploit-db.com?

Explore the top alternatives and rivals of exploit-db.com in April 2025, and assess their data relating to website traffic, SEO, Web Server Information, and Whois. Refer to the list below for the best competitors of exploit-db.com, and simply click on each one to delve into their specific details.

See More

Mentioned on Their Website:

  • exploit-db.com
    Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa …

    https://www.exploit-db.com/exploits/51361

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • rapid7.com
    PHP CGI Argument Injection Remote Code Execution - Rapid7

    https://www.rapid7.com/db/modules/exploit/windows/http/php_cgi_arg_injection_rce_cve_2024_4577/

    Description. This module exploits a PHP CGI argument injection vulnerability affecting PHP in certain configurations on a Windows target. A vulnerable configuration …

  • offsec.com
    Exploit Database 2022 Update - OffSec

    https://www.offsec.com/blog/exploit-db-2022-update/

    It’s been a minute since we last talked about Exploit Database, one of our community projects. Today we are excited to announce new updates! Here are the …

  • apnews.com
    Philippines seeks UN confirmation of its vast continental seabed …

    https://apnews.com/article/philippines-south-china-sea-continental-shelf-97da6db185774234bedba63c21e944d2

    MANILA, Philippines (AP) — The Philippines has asked a United Nations body to formally recognize the extent of its undersea continental seabed in the South China …

  • github.com
    offsoc/exploitdb: The Exploit Database - GitHub

    https://github.com/offsoc/exploitdb

    The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  • linkedin.com
    The Exploit Database | LinkedIn

    https://www.linkedin.com/company/the-exploit-database

    The Exploit Database | 451 followers on LinkedIn. The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability ...

  • exploit-db.com
    FlatPress v1.3 - Remote Command Execution - PHP webapps …

    https://www.exploit-db.com/exploits/51997

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • rapid7.com
    Vulnerability & Exploit Database - Rapid7

    https://www.rapid7.com/db/

    Exploit DB is a curated repository of vetted computer software exploits and exploitable vulnerabilities. Search over 180,000 vulnerabilities and 4,000 exploits by …

  • exploit-db.com
    WordPress Plugin Site Editor 1.1.1 - Local File Inclusion

    https://www.exploit-db.com/exploits/44340

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • exploit-db.com
    3Com TFTP Service (3CTftpSvc) 2.0.1 - Long Transporting Mode

    https://www.exploit-db.com/exploits/3388

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • null-byte.wonderhowto.com
    Using Exploits from Exploit-db.com « Null Byte :: WonderHowTo

    https://null-byte.wonderhowto.com/forum/using-exploits-from-exploit-db-com-0163013/

    How To: Create a Metasploit Exploit in Few Minutes ; Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 9 (How to Install New Modules) ; Hack Like a Pro: How to Find Exploits Using the Exploit Database in Kali ; How To: Easily Find an Exploit in Exploit DB and Get It Compiled All from Your Terminal. ...

  • exploit-db.com
    BadBlue 2.72b - PassThru Buffer Overflow (Metasploit)

    https://www.exploit-db.com/exploits/16806

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • discourse.pi-hole.net
    Not Able to Access exploit-db.com - Pi-hole Userspace

    https://discourse.pi-hole.net/t/not-able-to-access-exploit-db-com/35258

    Restarted Raspberry Pi multiple times. Restarted modem and router. The site is not down as I am able to access it using cell data on my phone. I ran nslookup exploit-db.com and it is showing an incorrect IP address for the site. I think that might be the issue, because when I check the Pi-hole logs exploit-db.com comes up green and shows ok ...

  • offsec.com
    What's new in the Exploit-Database? - OffSec

    https://www.offsec.com/blog/exploit-database-update/

    Tagging of exploits. Improved searching abilities. Interaction with authors when accepting new submissions. API interface (Exploit-DB partners only) Package improvements. Statistics. We are really happy with this latest update, giving the Exploit Database a much needed upgrade – ushering it into 2015 and beyond!

  • exploit-db.com
    WP Rocket < 2.10.3 - Local File Inclusion (LFI)

    https://www.exploit-db.com/exploits/51830

    Vulnerable App: Paulos Yibelo discovered and reported this Local File Inclusion vulnerability in WordPress WP Rocket Plugin. This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete …

  • exploit-db.com
    Apache Log4j 2 - Remote Code Execution (RCE) - Java remote …

    https://www.exploit-db.com/exploits/50592

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • exploit-db.com
    Lightweight facebook-styled blog 1.3 - Remote Code Execution …

    https://www.exploit-db.com/exploits/50064

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • exploit-db.com
    Open Web Analytics 1.7.3 - Remote Code Execution

    https://www.exploit-db.com/exploits/51026

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • github.com
    GitHub - offensive-security/exploitdb-papers: The legacy Exploit

    https://github.com/offensive-security/exploitdb-papers

    The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers - offensive-security/exploitdb-papers

  • exploit-db.com
    POP3 'PASS' Remote Buffer Overflow (1) - Exploit Database

    https://www.exploit-db.com/exploits/638

    Seattle Lab Mail (SLmail) 5.5 - POP3 'PASS' Remote Buffer Overflow (1). CVE-2003-0264CVE-11975 . remote exploit for Windows platform

  • github.com
    GitHub - vulsio/go-exploitdb: Tool for searching Exploits from …

    https://github.com/vulsio/go-exploitdb

    This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database (go-exploitdb) can be searched by command line interface. In server mode, a simple Web API can be used. As the following vulnerabilities database. ExploitDB (OffensiveSecurity) by CVE number or Exploit Database ID.

  • security.stackexchange.com
    Exploit-db like websites, where people can search for security bugs

    https://security.stackexchange.com/questions/2715/exploit-db-like-websites-where-people-can-search-for-security-bugs

    Stack Exchange Network. Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.. Visit Stack Exchange

  • ixyzero.com
    关于Exploit-DB漏洞库的使用 – ASPIRE

    https://ixyzero.com/blog/archives/318.html

    用Python和Shell写的自动提权工具(从Exploit-DB上找exp) https://github.com/ngalongc/AutoLocalPrivilegeEscalation

  • exploit-db.com
    OpenSSH 2.3 < 7.7 - Username Enumeration - Linux remote Exploit

    https://www.exploit-db.com/exploits/45233

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • exploit-db.com
    Microsoft Windows - Print Spooler Service Impersonation (MS10 …

    https://www.exploit-db.com/exploits/16361

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • exploit-db.com
    OpenEMR 5.0.1.3 - Remote Code Execution (Authenticated)

    https://www.exploit-db.com/exploits/45161

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • exploit-db.com
    Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    https://www.exploit-db.com/google-hacking-database?category=9

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • similarweb.com
    exploit-db.com Traffic Analytics, Ranking Stats & Tech Stack

    https://www.similarweb.com/website/exploit-db.com/

    The top traffic source to exploit-db.com is Organic Search traffic, driving 50.9% of desktop visits last month, and Direct is the 2nd with 38.38% of traffic. The most underutilized channel is Paid Search. Drill down into the main traffic drivers in each channel below. Marketing Channels Distribution. Direct. Referrals. Organic Search. Paid Search.

  • github.com
    GitHub - perplext/exploit-database: The official Exploit …

    https://github.com/perplext/exploit-database

    This is the official GitHub repository of The Exploit Database, a project sponsored by Offensive Security. It contains exploits, shellcodes, papers and the SearchSploit utility …

  • exploit-db.com
    Joomla! v4.2.8 - Unauthenticated information disclosure

    https://www.exploit-db.com/exploits/51334

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • support.holmsecurity.com
    What is Exploit-db Database? - Holm Security

    https://support.holmsecurity.com/knowledge/what-is-exploit-db-database

    Exploit-DB is a widely recognized online public database and platform that provides information about security vulnerabilities, exploits, and their corresponding proof-of-concept code. The Exploit-DB database, maintained by Offensive Security, contains many vulnerabilities and associated exploits gathered from various sources, including ...

  • exploit-db.com
    Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' …

    https://www.exploit-db.com/exploits/40839

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

  • securiteinfo.com
    exploit-database : une base de données d'exploits en ligne de …

    https://www.securiteinfo.com/attaques/hacking/outils/exploit-database.shtml

    Inscrivez vous à notre pour vous tenir au courant de nos actualités et de nos dernières trouvailles. Accédez en ligne de commande à plus de 40.000 vulnérabilités, exploits et shellcodes de la base de données d'exploit-db.com. Mis à jour très régulièrement.

  • exploit-db.com
    Uvdesk v1.1.3 - File Upload Remote Code Execution (RCE) …

    https://www.exploit-db.com/exploits/51639

    The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.

See More

DNS Lookup

DNS entries, such as A, NS, MX, and TXT records, are crucial for the functioning of the Internet. The A record maps a domain name to an IPv4 address, while the NS record specifies authoritative name servers for a domain. The MX record identifies the mail server responsible for receiving email messages for a domain. Additionally, the TXT record allows for the association of any text information with a domain name. These records play a vital role in ensuring proper communication and connectivity across the internet.

HostClassTTLTypeData
exploit-db.comIN7200Aip: 192.124.249.13
exploit-db.comIN10800NStarget: ns-108-b.gandi.net
exploit-db.comIN10800NStarget: ns-39-c.gandi.net
exploit-db.comIN10800NStarget: ns-93-a.gandi.net
exploit-db.comIN10800SOAmname: ns1.gandi.netrname: hostmaster.gandi.netserial: 1716422400refresh: 10800retry: 3600expire: 604800minimum-ttl: 10800
exploit-db.comIN7200MXtarget: alt1.aspmx.l.google.compri: 10
exploit-db.comIN7200MXtarget: aspmx3.googlemail.compri: 25
exploit-db.comIN7200MXtarget: aspmx.l.google.compri: 5
exploit-db.comIN7200MXtarget: alt2.aspmx.l.google.compri: 15
exploit-db.comIN7200MXtarget: aspmx2.googlemail.compri: 20
exploit-db.comIN7200TXTtxt: v=spf1 a mx include:aspmx.googlemail.com include:_spf.google.com ~all

exploit-db.com Traffic Analysis

According to global rankings, exploit-db.com holds the position of #86703. It attracts an approximate daily audience of 22.08K visitors, leading to a total of 22194 pageviews. On a monthly basis, the website garners around 662.45K visitors.

Daily Visitors22.08K
Monthly Visits662.45K
Pages per Visit2.96
Visit Duration0:02:53
Bounce Rate56.6%
Want complete report?Full SEMrush Report >>
Daily Unique Visitors:
22081
Monthly Visits:
662453
Pages per Visit:
2.96
Daily Pageviews:
22194
Avg. visit duration:
0:02:53
Bounce rate:
56.6%
Monthly Visits (SEMrush):
664909

Traffic Sources

SourcesTraffic Share
Social:
2.01%
Paid Referrals:
6.77%
Mail:
0.45%
Search:
56.87%
Direct:
33.89%

Visitors by Country

CountryTraffic Share
United States:
13.79%
Brazil:
7.82%
France:
6.40%
India:
5.85%
Turkey:
3.64%

SSL Checker - SSL Certificate Verify

An SSL certificate is a digital certificate that ensures a secure encrypted connection between a web server and a user's browser. It provides authentication and encryption to keep data private and protected during transmission. exploit-db.com supports HTTPS, demonstrating their commitment to providing a secure browsing experience for users.

name
exploit-db.com
hash
6f4e1898
issuer
Starfield Technologies, Inc.
version
2
serialNumber
4881157155849050020
validFrom_time_t
1697617220
validTo_time_t
1729239620
signatureTypeSN
RSA-SHA256
signatureTypeLN
sha256WithRSAEncryption
signatureTypeNID
668
keyUsage
Digital Signature, Key Encipherment
extendedKeyUsage
TLS Web Server Authentication, TLS Web Client Authentication
basicConstraints
CA:FALSE
subjectKeyIdentifier
FC:68:81:B9:A0:8C:E3:B1:BD:BC:64:C7:2F:46:4F:F2:58:62:D4:12
authorityKeyIdentifier
keyid:25:45:81:68:50:26:38:3D:3B:2D:2C:BE:CD:6A:D9:B6:3D:B3:66:63
authorityInfoAccess
OCSP - URI:http://ocsp.starfieldtech.com/ CA Issuers - URI:http://certificates.starfieldtech.com/repository/sfig2.crt
subjectAltName
DNS:www.exploit-db.com, DNS:exploit-db.com
certificatePolicies
Policy: 2.16.840.1.114414.1.7.23.1 CPS: http://certificates.starfieldtech.com/repository/ Policy: 2.23.140.1.2.1

HTTP Headers

HTTP headers are additional segments of data exchanged between a client (e.g. a web browser) and a server during an HTTP request or response. They serve to provide instructions, metadata, or control parameters for the interaction between the client and server.

Status
HTTP/1.1 403 Forbidden
Server
Sucuri/Cloudproxy
Date
Wed, 29 May 2024 02:49:45 GMT
Content-Type
text/html
Content-Length
146
Connection
keep-alive
X-Sucuri-ID
11013
X-Sucuri-Block
BNP004

Where is exploit-db.com hosted?

exploit-db.com is likely hosted in various data centers located across different regions worldwide. The current data center mentioned is just one of many where the website may be hosted.

Whois Information

WHOIS protocol used to get domain/IP info. Common for reg details, ownership of a domain/IP. Check exploit-db.com for reg/admin contact info, owner, org, email, phone, creation, and expiration dates.

Domain Updated Date:2023-10-19
Domain Created Date:2009-11-19
Domain Expiry Date:2024-11-19
Domain Name:
Registrar WHOIS Server:whois.gandi.net
Registrar Abuse Contact Email:[email protected]
Registrar Abuse Contact Phone:+33.170377661
Domain Registrar:GANDI SAS
Domain Owner:Offensive Security

Domain Name: exploit-db.com

Registry Domain ID: 1576318363_DOMAIN_COM-VRSN

Registrar WHOIS Server: whois.gandi.net

Registrar URL: http://www.gandi.net

Updated Date: 2023-10-19T19:16:13Z

Creation Date: 2009-11-19T21:12:26Z

Registrar Registration Expiration Date: 2024-11-19T22:12:26Z

Registrar: GANDI SAS

Registrar IANA ID: 81

Registrar Abuse Contact Email: [email protected]

Registrar Abuse Contact Phone: +33.170377661

Registrant Organization: Offensive Security

Registrant Country: GI

Registrant Email: [email protected]

Admin Email: [email protected]

Tech Email: [email protected]

Name Server: NS-39-C.GANDI.NET

URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/

SEO Analysis

SEO analysis involves examining the performance of a website, including titles, descriptions, keywords, and website speed. It also includes identifying popular keywords and researching competitor websites to understand their strategies. The analysis aims to optimize the website's visibility and improve its ranking on search engines.

Title Tag:
Sucuri WebSite Firewall - Access Denied

Length: 39 characters

Title tags are usually best kept short, within 50-70 characters. It's important to note that search engines will typically read the entire title tag even if it exceeds 70 characters, but there is a chance they may cut it off or disregard it.

Meta Description:

No meta description found.

Length: 0 characters

When crafting website descriptions, keep in mind that search engines only show the first 150-160 characters in search results. To ensure your entire description is visible, aim for a length of 25-160 characters. If your description is too long, it may get cut off. Conversely, if it's too short, search engines may add text from elsewhere on your page. Additionally, search engines may modify the description you provide to better match the user's search intent. It's best to strike a balance between brevity and relevance for optimal visibility.

Meta Keywords:

No meta keywords found.

In the realm of search engine optimization, the meta keywords tag has become a relic of the past due to its potential for misuse, ultimately leading major search engines to disregard it in their ranking algorithms.

Keywords Cloud:
Term Count Density
block 5 7.35%
sucuri 4 5.88%
firewall 3 4.41%
website 3 4.41%
site 2 2.94%
details 2 2.94%
denied 2 2.94%
access 2 2.94%
safari 1 1.47%
chrome 1 1.47%
black 1 1.47%
reason 1 1.47%
html 1 1.47%
www 1 1.47%
googlebot 1 1.47%
http 1 1.47%
google 1 1.47%
bot 1 1.47%
blocked 1 1.47%
server 1 1.47%
rights 1 1.47%
reserved 1 1.47%
privacy 1 1.47%
time 1 1.47%
request 1 1.47%
listed 1 1.47%
blacklist 1 1.47%
compatible 1 1.47%
completing 1 1.47%
address 1 1.47%
browser 1 1.47%
open 1 1.47%
support 1 1.47%
ticket 1 1.47%
make 1 1.47%
error 1 1.47%
whitelist 1 1.47%
back 1 1.47%
net 1 1.47%
owner 1 1.47%
manage 1 1.47%
include 1 1.47%
displayed 1 1.47%
exploit-db 1 1.47%
mozilla 1 1.47%
applewebkit 1 1.47%
khtml 1 1.47%
url 1 1.47%
issue 1 1.47%
box 1 1.47%
assist 1 1.47%
troubleshooting 1 1.47%
gecko 1 1.47%

A crucial factor in search engine optimization is keyword density, which refers to the proportion of a particular keyword present in the text of a webpage. In order to achieve high rankings on search engine results pages, it is essential to maintain the appropriate keyword density for your primary keyword.

Headings:
<H1>
1
<H2>
1
<H3>
0
<H4>
0
<H5>
0
<H6>
0
<h1> Access Denied - Sucuri Website Firewall</h1>
<h2>Block details:</h2>

In SEO, the primary focus is placed on keywords within the content. The title of the page holds the highest importance, followed by heading tags such as h1, h2, and h3. The h1 heading should be the largest on the page, while the h2 heading should be slightly smaller, and the h3 heading even smaller. This hierarchical structure is crucial for optimizing search engine rankings.

Image Alt Attribute:
2 images found in your page, and 2 images are without "ALT" text.

What is the issue about?
The tag does not have an ALT attribute defined. As a general rule, search engines do not interpret the content of image files. The text provided in the attribute enables the site owner to provide relevant information to the search engine and to the end user. Alt text is helpful to end users if they have images disabled or if the image does not properly load. In addition, the Alt text is utilized by screen readers. Make sure that your Alt text is descriptive and accurately reflects what the image represents and supports the content on the page.

How to fix?
Use the <img alt> attribute to write descriptive content for the image: <img source='pic.gif' alt='Accurate and descriptive keyword text that represents the image.' />.

Website Speed Test (Desktop):
0.15 seconds

Website speed is a measurement of how fast the content on your page loads. Website speed is one of many factors involved in the discipline of search engine optimization (SEO), but it is not the only one. In a recent study, the average load time for a web page was 3.21s.

Top Organic Search Terms:
Term Search Volume Traffic Traffic (%)
exploid db 30 0 0%
kali linux exploit db 70 0 0%
exploitdb 480 0 0%
database exploits 390 0 0%

CO-Hosted

CoHosted refers to a situation where multiple domain names (websites) are using the same IP address to point to their respective web servers. They could be owned by different individuals or organizations and may serve entirely different purposes.

exploit-db.com
zycrypto.com
minidisc.com.au

People reviews about exploit-db.com

Very positive reviews

rating 5

Total reviews: 2
Average score: 5 stars

The total score is based on reviews found on the following sites
Scamadviser: 5/5 stars, 2 reviews

Add your review

rating 1 rating 2 rating 3 rating 4 rating 5

Very positive reviews

rating 5

Total reviews: 2
Average score: 5 stars

The total score is based on reviews found on the following sites
Scamadviser: 5/5 stars, 2 reviews


Back Top
Feedback