The document contains paths to exploits targeting various platforms including Windows, Linux, Solaris, BSD, Cisco hardware, and PHP. The exploits include remote exploits, local privilege escalation exploits, denial of service exploits, and buffer overflows. The targets include software like servers, browsers, mail servers, databases, and games.
Download as TXT, PDF, TXT or read online on Scribd
0%(1)0% found this document useful (1 vote)
31K views
Sploitlist
The document contains paths to exploits targeting various platforms including Windows, Linux, Solaris, BSD, Cisco hardware, and PHP. The exploits include remote exploits, local privilege escalation exploits, denial of service exploits, and buffer overflows. The targets include software like servers, browsers, mail servers, databases, and games.
Michael Bazzell - Open Source Intelligence Techniques - Resources For Searching and Analyzing Online Information-Createspace Independent Publishing Platform (2021)