finds you similar websites
auto-suggest    top sites

May 16th, 2024

10 Popular Sites Like Exploit-db

The team has explored the web and uncovered a lot of excellent security and hacking sites like Exploit-db. Come by and check out websites that resemble Exploit-db.

Displaying 481 to 490 of 500 alternatives to Exploit-db. (Updated: May 16th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Exploit-db:
  Offensive Security Training presents - The Ex...
A great resource for penetration testers, vulnerability researchers, and ... Our aim is to collect exploits from submittals and mailing lists and concentrate ...
http://www.exploit-db.com/
popularity:
security
hacking
exploits
exploit
database
reference
hack
opensource
tools
linux
new search by a custom tag signature
  Network Security Toolkit
This bootable ISO live CD/DVD is based on Fedora. ... The main intent of developing this toolkit was to provide the network security ...
similarity:
popularity:
security
linux
livecd
network
opensource
tools
distribution
os
software
networking
  The Last HOPE - July 18-20, 2008 - Hotel Pennsylvania - New York City
The Last HOPE (www.thelasthope.org) is this Summer's hacker conference sponsored by ... Attendee Meta-Data (AMD) Project to Track and Connect People at ...
similarity:
popularity:
hacking
security
conference
network
nyc
community
2600
hacker
hope
events
  PDF Tools « Didier Stevens
The stats option display statistics of the objects found in the PDF ... Use this to identify PDF documents with unusual/unexpected objects, or to classify PDF ...
similarity:
popularity:
pdf
security
tools
analysis
python
malware
forensics
reversing
exploit
reference
  Security Bloggers Network
No information avaiable
similarity:
popularity:
security
blog
hacking
blogs
network
infosec
news
internet
list
sysadmin
  HOW TO BYPASS BIOS PASSWORDS
No information avaiable
similarity:
popularity:
bios
password
hacking
hardware
hack
reference
passwords
geek
security
computer
  Lenny Zeltser's Website
Lenny Zeltser's publications, research, and projects related to information security, risk management, business, and life in general.
similarity:
popularity:
security
malware
web
hacking
people
blog
virus
technology
management
infosec
  Schneier on Security: Hacking Computers Over USB
No information avaiable
similarity:
popularity:
security
usb
hacking
computers
interesting
ipod
autorun
articles
portable
remote
  iplist
No information avaiable
similarity:
popularity:
security
linux
privacy
firewall
networking
iplist
iptables
p2p
software
opensource
  the tls report
https security ssl programming network first saved by Christian Winkler on 2009-06-10 ... tlsreport.layer8.net - Preview. web ssl lang_en tls securty first ...
similarity:
popularity:
security
ssl
web
tls
tools
server
ratings
resources
hosting
reference
< prev 1 ... 47 48 49 50 ... next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.