Canvas Exploit Platform
A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
Exploiting Caller ID
The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
Fyodor's Exploit World
A large and descriptive exploit archive organized by affected operating systems.
Well established resource and forum for exploits, tools and learning the basics of hacking.
High-Tech Bridge: Security Advisories
Database of vulnerabilities in software.
Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.
Open source penetration testing software with a large, active community.
Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, and format strings.
Collection of older exploits and tools.
Rapid7 Vulnerability and Exploit Database
A collection of disclosed exploits and vulnerabilities in various major software products.
Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
Archive of exploits and security advisories
A collection of security and exploit resources. Also has a large IRC community.