hello i just found this site on a forum, and What i have Understand This site Make exploits, and i just woundering if ppl use this exploits to make Bad Things on other pages so they get infected to lure pepole?
hxxp://www.exploit-db.com/
hello i just found this site on a forum, and What i have Understand This site Make exploits, and i just woundering if ppl use this exploits to make Bad Things on other pages so they get infected to lure pepole?
hxxp://www.exploit-db.com/
Hi chabbo,
Only TrendMicroWeb reputation flags it, but this URL is not currently listed as malicious an sich.
It is for security staff that are allowed to pentest the sites they are authorized to test. Pentesting is done to harden the security settings of a server, site or network in certain particular security settings and under particular lab circumstances. The site is not making the exploits, they are just storing them as they found them from various sources and there are various resources for malcreations, also blocklists may have links to live malware. There is always a warning not to click the malcreations or the links there as one does not know what one does and is not a security expert or the like. Same goes for other analyzing sites like jsunpack for instance, use the browser in a sandbox, block scripts with NoScript and RequestPolicy extensions active on the jsunpack website or NotScripts in GoogleChrome together with the Flashblock and Noref extension. These sites are meant for security experts only or for savvy users that further want to study malcode analysis, so give the link to it as hxtp or wXw will ye…
polonus
They have a archive containing 12 727 exploits, scanning that file with avast! gives 573 detections Avira gives 1102 detections
will upload the file to avast so they can play with it
If you consider a site to be malicious than you really shouldn’t allow the link to be clickable/active, change the http to hXXp as I have done in your quoted text.
Hi DavidR,
At the end of my post above, I also asked him to give the link as a “non-click-through”…
polonus
Seems to have worked then ;D