Exploits
GHDB
Papers
Shellcodes
Search EDB
SearchSploit Manual
Submissions
Online Training
Stats
About Us
Search
This one shows configuration files for various applications. based on the application an attacker may find information like passwords, ipaddresses and more.