0day.today – Biggest Exploit Database in the World.

- We use one main domain: https://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn
GOLD
Administration of this site uses the official contacts. Beware of impostors!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Jabber:
Facebook:
Twitter:
Inj3ct0r
You can contact us by:
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
0day.today Available within TOR at http://mvfjfugdwgc5uwho.onion
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
0day.today Available within TOR at http://mvfjfugdwgc5uwho.onion
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
117
Security Risk Medium
D
Download
C
CVE-2018-0891
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
Microsoft Windows Kernel – nt!NtWaitForDebugEvent 64-bit Stack Memory Disclosure Exploit
Comments:
0
92
Security Risk Medium
D
Download
C
CVE-2018-0901
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
Microsoft Windows Kernel – nt!KiDispatchException 64-bit Stack Memory Disclosure Exploit
Comments:
0
91
Security Risk Medium
D
Download
C
CVE-2018-0897
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
Microsoft Windows Kernel – NtQueryInformationThread(ThreadBasicInformation) 64-bit Stack Memory Disc
Comments:
0
71
Security Risk Medium
D
Download
C
CVE-2018-0895
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
Microsoft Windows Kernel – NtQueryVirtualMemory(MemoryMappedFilenameInformation) 64-bit Pool Memory
Comments:
0
82
Security Risk Medium
D
Download
C
CVE-2018-0894
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
98
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
EnableSecurity
Exploits:
1
BusinessLevel:
10
Warnings:
0
143
Security Risk Medium
D
Download
C
CVE-2017-10004
Verified by 0day Admin
free
You can open this exploit for free
anonymous
Exploits:
22
BusinessLevel:
5
Warnings:
0
139
Security Risk Medium
D
Download
C
CVE-2017-16994
Verified by 0day Admin
free
You can open this exploit for free
anonymous
Exploits:
22
BusinessLevel:
5
Warnings:
0
Linux Kernel < 4.5.1 – Off-By-One (PoC) Exploit
Comments:
0
127
Security Risk Medium
D
Download
C
CVE-2016-6187
Verified by 0day Admin
free
You can open this exploit for free
Vitaly Nikolenko
Exploits:
6
BusinessLevel:
2
Warnings:
0
Dell EMC NetWorker Buffer Overflow Vulnerability
Comments:
0
91
Security Risk High
D
Download
C
CVE-2018-1218
Verified by 0day Admin
free
You can open this exploit for free
Marek Cybul
Exploits:
1
BusinessLevel:
0
Warnings:
0
Easy Chat Server 3.1 Buffer Overflow Exploit
Comments:
0
94
Security Risk Medium
D
Download
C
CVE-2004-2466
Verified by 0day Admin
free
You can open this exploit for free
r00tpgp
Exploits:
2
BusinessLevel:
0
Warnings:
0
Android DRM Services – Buffer Overflow Exploit
Comments:
0
268
Security Risk High
D
Download
C
CVE-2017-13253
Verified by 0day Admin
free
You can open this exploit for free
Tamir Zahavi-Brunner
Exploits:
1
BusinessLevel:
0
Warnings:
0
321
Security Risk Medium
D
Download
C
CVE-2017-9417
Verified by 0day Admin
free
You can open this exploit for free
@037
Exploits:
5
BusinessLevel:
0
Warnings:
0
Memcached 1.5.5 – Memcrashed Insufficient Control of Network Message Volume Denial of Service
Comments:
0
276
Security Risk Medium
D
Download
C
CVE-2018-10001
Verified by 0day Admin
free
You can open this exploit for free
@037
Exploits:
5
BusinessLevel:
0
Warnings:
0
228
Security Risk Medium
D
Download
C
CVE-2018-7582
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
164
BusinessLevel:
10
Warnings:
2
Chrome V8 Out-Of-Bounds Read Exploit
Comments:
0
265
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
Chrome V8 JIT Optmization Bug Exploit
Comments:
0
195
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
185
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
172
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
718
BusinessLevel:
38
Warnings:
0
169
Security Risk Medium
D
Download
C
CVE-2018-7658
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
164
BusinessLevel:
10
Warnings:
2
Memcached – memcrashed Denial of Service Exploit
Comments:
0
289
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Alex Conrey
Exploits:
1
BusinessLevel:
0
Warnings:
0
164
Security Risk Medium
D
Download
C
CVE-2018-6794
Verified by 0day Admin
free
You can open this exploit for free
Positive Technologies
Exploits:
1
BusinessLevel:
0
Warnings:
0
235
Security Risk Medium
D
Download
C
CVE-2017-8311
Verified by 0day Admin
free
You can open this exploit for free
SivertPL
Exploits:
3
BusinessLevel:
1
Warnings:
0
125
Security Risk Medium
D
Download
C
CVE-2016-7608
Verified by 0day Admin
free
You can open this exploit for free
Brandon Azad
Exploits:
6
BusinessLevel:
0
Warnings:
0
Apple macOS Sierra 10.12.3 – IOFireWireFamily-null-deref FireWire Port Denial of Service Exploit
Comments:
0
118
Security Risk Medium
D
Download
C
CVE-2017-2388
Verified by 0day Admin
free
You can open this exploit for free
Brandon Azad
Exploits:
6
BusinessLevel:
0
Warnings:
0
131
Security Risk Medium
D
Download
C
CVE-2016-1827
Verified by 0day Admin
free
You can open this exploit for free
Brandon Azad
Exploits:
6
BusinessLevel:
0
Warnings:
0
168
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Specter
Exploits:
6
BusinessLevel:
0
Warnings:
0
136
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Specter
Exploits:
6
BusinessLevel:
0
Warnings:
0
157
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Specter
Exploits:
6
BusinessLevel:
0
Warnings:
0

















How to buy exploit? Two ways to buy required exploit. Currency, that we accept.
What is 0day.today 1337day Gold? How to buy 0day.today 1337day Gold? How to earn 0day.today 1337day Gold?