How to Use ExploitDB (BSWJ)
As a pentester, you have a lot to gain by taking this “How to use ExploitDB (BSWJ)” course. In this episode of Breaking Stuff with Joe (BSWJ), cybersecurity expert Joe Perry shows you how to use ExploitDB, an extensive collection of exploit code that is maintained by Offensive Security, the organization behind Kali Linux.
Already have an account? Sign In »

LEARN MORE. ACHIEVE MORE.
Deciphering the essentials to enter a new career is hard, so we did it for you!
Focus on building your skills and take this course in a guided Career Path.
Why do work when it's already been done for you? That's the thought process behind some of the most useful and impactful tools ever created, and it's the guiding principle behind the ExploitDB.
Maintained by Offensive Security (the organization behind Kali Linux), the ExploitDB is the most complete collection of exploit code in the world. It's an invaluable resource to any penetration tester. With this video, you'll become familiar with this phenomenally useful database, and you'll better understand how to leverage it in your security work.
Teaching Assistant Vikramajeet Khatri
(Disclaimer: Breaking Stuff with Joe is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Joe' episode. However, you can still earn a certificate of completion for each episode completed.)



Complete this entire course to earn a How to Use ExploitDB (BSWJ) Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.
Verticals
CyberSecurity
Skillset
Domains