
Jan 7, 2014
Exploit Database Hosted on GitHub
We have recently completed some renovations on the Exploit Database backend systems and moved the EDB exploit repository to Github. This means that it’s now easier than ever to copy, clone or fork the whole repository. The previous SVN CVS has been retired.
We have recently completed some renovations on our Exploit Database backend systems and have taken this opportunity to transition our SVN server to an EDB repository hosted on GitHub. This means that it’s now easier than ever to copy, clone, or fork the whole repository. The previous SVN CVS has been retired. To clone the latest version of EDB exploits, you can simply run the following:
[cc lang=”bash”]
git clone https://github.com/offensive-security/exploit-database
[/cc]
With this transition to GitHub, we have also changed the repository update interval from weekly to daily so you can stay on the bleeding edge far more easily.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability
CVE-2024-12029: A critical deserialization vulnerability in InvokeAI’s /api/v2/models/install endpoint allows remote code execution via malicious model files. Exploit risk for AI art servers.
Jul 17, 2025
0
Research & Tutorials
What is Phishing? Introduction to Phishing Demo (for Beginners)
Learn how phishing attacks work and how to spot them. Watch OffSec’s animated video to protect yourself from scams, spoofed sites, and social engineering.
Jul 15, 2025
2 min read

Research & Tutorials
CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass
Discover the critical Apache Camel vulnerability (CVE-2025-27636) that allows remote code execution via case-sensitive HTTP header manipulation in the exec component. Learn how attackers exploit this flaw and how to mitigate it.
Jul 10, 2025
2 min read