
Jan 7, 2014
Exploit Database Hosted on GitHub
We have recently completed some renovations on the Exploit Database backend systems and moved the EDB exploit repository to Github. This means that it’s now easier than ever to copy, clone or fork the whole repository. The previous SVN CVS has been retired.
We have recently completed some renovations on our Exploit Database backend systems and have taken this opportunity to transition our SVN server to an EDB repository hosted on GitHub. This means that it’s now easier than ever to copy, clone, or fork the whole repository. The previous SVN CVS has been retired. To clone the latest version of EDB exploits, you can simply run the following:
[cc lang=”bash”]
git clone https://github.com/offensive-security/exploit-database
[/cc]
With this transition to GitHub, we have also changed the repository update interval from weekly to daily so you can stay on the bleeding edge far more easily.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec
Research & Tutorials
9 OSCP Study Tips to Help You Succeed
We’ve gathered some of the best OSCP study tips from the community and compiled them into one place to help prepare you for your upcoming exam!
Aug 20, 2025
9 min read

Research & Tutorials
CVE-2025-29891 – Apache Camel Exploit via CAmelExecCommandArgs Header Injection
Discover how CVE-2025-29891 impacts Apache Camel via CAmelExecCommandArgs header injection. Learn how attackers exploit this misconfiguration for remote code execution and how to secure your systems.
Aug 8, 2025
2 min read

Research & Tutorials
CVE-2025-30208 – Vite Arbitrary File Read via @fs Path Traversal Bypass
Discover CVE-2025-30208, a critical arbitrary file read vulnerability in the Vite development server. Learn how remote attackers exploit @fs URL handling to access sensitive files.
Jul 31, 2025
1 min read