
Nov 26, 2018
Exploit Database Redesign
Offensive Security is delighted to announce the complete redesign of The Exploit Database (EDB), making it easier and faster than ever to find the data you need and presenting it to you in a responsive dashboard layout.
Offensive Security is delighted to announce the complete redesign of The Exploit Database (EDB), making it easier and faster than ever to find the data you need and presenting it to you in a responsive dashboard layout.
The update to EDB includes a complete redesign to improve the speed and accuracy of searches. This includes an all-new user interface, making it easier for testers and researchers to access the data they want, when they want it. For example, in the new version of EDB, it only takes two clicks to search and filter for remote exploits targeting the Windows platform. Prior to the redesign, this took at least five clicks to accomplish, depending on your familiarity with the site.
Some key elements of the update include:
- Instant searching of displayed results
- A new dashboard interface that helps users quickly see and do more with the database
- Dynamic filters that enable quick switching between types, platforms, authors, ports and tags
- Clearly defined sections for exploits, papers, shellcode and the Google Hacking Database (GHDB), with a common look and feel throughout
- Ability to quickly limit results to those that have been verified and those for which we have hosted a copy of the vulnerable application
We hope you love this redesign as much as we do but if you really can’t stand it, the old interface is available (for now) at old.exploit-db.com. All of these new features are just the beginning. Over the next few months, we will be continuing to add new features to the platform so stay tuned for more information.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read