Exploit Database Exploit Database
  • Exploits

  • GHDB

  • Papers

  • Shellcodes


  • Search EDB

  • SearchSploit Manual

  • Submissions


  • Online Training

    • PWK PEN-200
    • WiFu PEN-210
    • ETBD PEN-300
    • AWAE WEB-300
    • WUMED EXP-301
Exploit Database
  • Stats

  • About Us

    About Exploit-DB Exploit-DB History FAQ
  • Search

  • What is a Cookie

  • First-party cookies and
    third-party cookies

  • Google Analytics

  • Persistent and session cookies

  • How do I manage cookies?

  • What kind of Cookies do we use?

  • Updates to this Cookie Policy

Cookie Policy

Last revised: August 20, 2019

Our Cookie Policy (the "Cookie Policy") describes the different cookies used in connection with websites owned and controlled by OffSec Services Limited, 5 Secretary’s Lane, Gibraltar (“Offensive Security” or "us"), from which you are accessing this Cookie Policy (the “Site”). Offensive Security determines the means and purposes of the personal data processing described in this Cookie Policy and is therefore the data controller for the purposes of the EU General Data Protection Regulation (or GDPR).

Depending on the Site you are accessing, our privacy notice applies in addition to this Cookie Policy.

If you have questions, please contact us by email at privacy @ offensive-Security.com or write to us at:

Offensive Security
230 Park Avenue 3rd Floor West
New York, NY 10169.

What is a Cookie?

Cookies are a standard feature of websites that allow us to store small amounts of data on your computer about your visit to the Site. They are widely used to help make websites work or work in a better, more efficient way, such as by recognizing you and remembering information that will make your use of the website more convenient (such as by remembering your preference settings). Cookies also help us to learn which areas of the Site are useful and which areas need improvement, and to track your usage of the Site to provide you with targeted advertisements.

First-party cookies and third-party cookies

Cookies are downloaded by your internet browser the first time you visit the Site. The next time you visit the Site from the same device, the cookie and the information stored in it is either sent back to the site generating it (first-party cookie) or to a different website to which it belongs (third-party cookie).

These third-party providers set cookies when you are logged on to their pages and visit our Site. We have no influence on the cookie settings of these websites. Please visit the websites of third-party providers to obtain further information on how they use cookies.

First-party and third-party cookies enable the website to recognize whether you have already accessed the Site through a browser and, often make the content displayed vary.

You can change your cookie settings within your internet browser. Your internet browser allows you to change your cookie settings.

Google Analytics

Like many websites, we use Google Analytics, a web analysis tool provided by Google Inc. ("Google") that allows us to keep the Site relevant to you. Google Analytics uses its third party cookies to track your preferences when you visit the Site. The data is only analyzed for reports after anonymization.

We also run Google Analytics Demographics and Interest Reporting. These cookies gather data on how visitors interact with the Site (as well as demographic data such as age and gender) to optimize website content and marketing.

If you have accessed our website via a Google Ad, Google places a cookie on your computer. When you visit the Site, we and Google can recognize that someone has clicked on an ad and been directed to our page as a result. This allows us to optimize our marketing and services and to understand the total number of customers who have clicked on our Google Ad and been redirected to the Site.

Google’s remarketing technology means that users who have already visited our Site and shown an interest in what we have to offer are shown targeted advertising on other websites of the Google Partner network. The ads are displayed through the use of cookies, and the user’s behavior during their visit to the website is analyzed and then used for targeted product recommendations and interest-based advertising.

When you visit a website that uses analytics tools like Google Analytics, your web browser automatically sends certain information to Google. This includes the URL of the page you’re visiting and your IP address. Google may also set cookies on your browser or read cookies that are already there.

For more information on how Google uses information from sites that use its services and how you can control the information collected by Google please visit:

How Google uses information from sites that use its services

Persistent and session cookies

Depending on their lifespan, Cookies can be distinguished between “persistent” or “session” cookies.

A persistent cookie is stored on your computer until it expires or you delete it.

A session cookie is deleted when you close your browser.

You generally can choose whether to accept cookies by changing the settings on your browser. For further details see below.

How do I manage cookies?

Deactivate and/or delete cookies via your browser

In addition, you can change your cookie settings within your internet browser. Your internet browser allows you to change your cookie settings. Such browser settings for cookies are typically found in the “options”, “tools” or “preferences” menu of your internet browser. You may also consult the browser's “help” menu. Different browsers may use different mechanisms to disable cookies.

Please consult the links below for more details on how to manage your cookie settings:

Cookie settings in Internet Explorer Cookie settings in Firefox Cookie settings in Chrome Cookie settings in Safari

As regards the browser settings for the deletion of former cookies, the same principles apply as for the deactivation of new cookies via your browser settings. Please follow the respective guidance of your browser as described above.

Deactivate Google related cookies

You can disable Google Analytics related cookies in all the ways described in this Cookie Policy or, additionally, by downloading and installing a browser plug-in. The current link is:

https://tools.google.com/dlpage/gaoptout/

If you do not wish to receive any interest-based advertising, you can deactivate Google’s use of cookies for these purposes by going to

https://adssettings.google.com

Deactivate cookies via other online tools

There are online tools available for clearing all cookies left behind by the websites you have visited, such as www.allaboutcookies.org and http://optout.networkadvertising.org/?c=1.

When you visit this Site from different computers, it will be necessary to repeat the modification of your settings.

The impact of deactivating cookies in these ways

The rejection of cookies may impact your user experience and functionality while using the Site. For example, some cookies are necessary for the website to function. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. If for example, you set your browser to block or alert you about these cookies, some parts of the site will not work.

If you reject the use of all cookies that you are able to, first-party and third-party cookies will be deactivated. First-party cookies will be deleted. We cannot delete any third-party cookie. Therefore, you have to delete third-party cookies on your own. This can be done within the settings of your browser as explained above.

What kind of Cookies do we use?

The tables below list all the types of cookies we and third parties use on the Site, with information regarding their retention periods (i.e. how long each cookie will remain on your device) and their source (i.e. 1st party or third-party cookies).

Updates to this Cookie Policy

You can find out when this Cookie Policy was last amended by checking "LAST REVISED" at the top of this page.

Downloads Certifications Training Professional Services
Kali Linux OSCP Penetration Testing with Kali Linux (PWK) (PEN-200)
All new for 2020
Penetration Testing
Kali NetHunter OSWP Offensive Security Wireless Attacks (WiFu) (PEN-210) Advanced Attack Simulation
Kali Linux Revealed Book OSEP Evasion Techniques and Breaching Defences (PEN-300)
All new for 2020
Application Security Assessment
OSWE Advanced Web Attacks and Exploitation (AWAE) (WEB-300)
Updated for 2020
OSED Windows User Mode Exploit Development (EXP-301)
All new for 2021
OSEE
KLCP [Free] Kali Linux Revealed
Downloads
Kali Linux Kali NetHunter Kali Linux Revealed Book
Certifications
OSCP OSWP OSEP OSWE OSED OSEE KLCP
Training
- Penetration Testing with Kali Linux (PWK) (PEN-200)
All new for 2020
Offensive Security Wireless Attacks (WiFu) (PEN-210) Evasion Techniques and Breaching Defences (PEN-300)
All new for 2020
Advanced Web Attacks and Exploitation (AWAE) (WEB-300)
Updated for 2020
Windows User Mode Exploit Development (EXP-301)
All new for 2021
[Free] Kali Linux Revealed
Pro Services
Penetration Testing Advanced Attack Simulation Application Security Assessment
  • Exploit Database by Offensive Security
  • Terms
  • Privacy
  • About Us
  • FAQ
  • Cookies
© OffSec Services Limited 2023. All rights reserved.
About The Exploit Database

Offensive Security The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by Offensive Security.

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.

The Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web document that was crawled by a search engine that subsequently followed that link and indexed the sensitive information.

The process known as “Google Hacking” was popularized in 2000 by Johnny Long, a professional hacker, who began cataloging these queries in a database known as the Google Hacking Database. His initial efforts were amplified by countless hours of community member effort, documented in the book Google Hacking For Penetration Testers and popularised by a barrage of media attention and Johnny’s talks on the subject such as this early talk recorded at DEFCON 13. Johnny coined the term “Googledork” to refer to “a foolish or inept person as revealed by Google“. This was meant to draw attention to the fact that this was not a “Google problem” but rather the result of an often unintentional misconfiguration on the part of a user or a program installed by the user. Over time, the term “dork” became shorthand for a search query that located sensitive information and “dorks” were included with may web application vulnerability releases to show examples of vulnerable web sites.

After nearly a decade of hard work by the community, Johnny turned the GHDB over to Offensive Security in November 2010, and it is now maintained as an extension of the Exploit Database. Today, the GHDB includes searches for other online search engines such as Bing, and other online repositories like GitHub, producing different, yet equally valuable results.

Offensive Security Resources
Downloads Certifications Training Services
Kali Linux OSCP Penetration Testing with Kali Linux (PWK) (PEN-200)
All new for 2020
Penetration Testing
Kali NetHunter OSWP Offensive Security Wireless Attacks (WiFu) (PEN-210) Advanced Attack Simulation
Kali Linux Revealed Book OSEP Evasion Techniques and breaching Defences (PEN-300)
All new for 2020
Application Security Assessment
OSWE Advanced Web Attacks and Exploitation (AWAE) (WEB-300)
Updated for 2020
OSED Windows User Mode Exploit Development (EXP-301)
All new for 2021
OSEE
KLCP [Free] Kali Linux Revealed
Search The Exploit Database