About Exploit Intelligence Platform

Automated vulnerability and exploit intelligence for security professionals.

What is EIP?

The Exploit Intelligence Platform tracks vulnerabilities and public exploit code across the security landscape. We aggregate data from NVD, CISA KEV, VulnCheck KEV, InTheWild.io, ENISA EUVD, OSV.dev, EPSS, ExploitDB, Metasploit, GitHub, GHSA, Nuclei, and other sources into a single searchable platform with real-time scoring, ransomware attribution, AI-powered analysis, and exploit code access.

The Crew

We're a mixed crew of hackers, researchers, and defenders - some of us still remember the milw0rm days, others grew up on GitHub. We built EIP because we missed an exploit archive that was fast, trustworthy, and rich with context. We are a non-commercial group, we are not selling anything, and we do this because we genuinely love the field. Old-school spirit, modern intel - built for responsible research and authorized testing.

If you have ideas, feedback, or want to collaborate, we would genuinely love to hear from you: exploit.intel at proton.me.

Need More Than the Public API?

Pulling large volumes, hitting limits, or exploring full-mirror workflows? Talk to us first. We are actively working toward sharing backend code and self-hosted Docker options for teams that need deeper access.

Reach us at exploit.intel at proton.me and tell us your use case.

337,067
CVEs Tracked
53,218
Public Exploits
42,412
Researchers
76,032
AI Analyzed

Data Sources

NVD
NIST National Vulnerability Database -- CVE details, CVSS scores, CPE products
CISA KEV
Known Exploited Vulnerabilities catalog -- actively exploited in the wild
VulnCheck KEV
Extended exploitation intel -- 4,600+ exploited CVEs, ransomware attribution
InTheWild.io
Crowd-sourced exploitation signals + PoC repo URLs -- 1,900+ confirmed wild exploits
ENISA EUVD
EU Vulnerability Database -- EUVD cross-references for 1,500+ exploited CVEs
OSV.dev
Open Source Vulnerabilities -- Linux kernel affected version ranges
CVEProject
CNA-provided titles from cvelistV5 -- authoritative CVE metadata
EPSS
Exploit Prediction Scoring System -- probability of exploitation in 30 days
ExploitDB
Offensive Security archive -- 47K+ verified exploits with code
Metasploit
Rapid7 framework -- 3K+ penetration testing modules
GitHub
PoC repositories -- discovered via search API and community aggregators
GHSA
GitHub Security Advisories -- ecosystem-specific vulnerabilities
Nuclei
ProjectDiscovery templates -- scanner signatures with Shodan/FOFA dorks
NomiSec
Curated PoC aggregator -- cross-referenced exploit links
AI Analysis
LLM-powered classification, MITRE ATT&CK mapping, trojan detection

Features

Full-Text Search
CVE IDs, descriptions, products, CWEs -- sub-second results across 350K+ entries
Exploit Code Viewer
Browse and download PoC code with syntax highlighting, password-protected ZIPs
AI Exploit Analysis
Classification, complexity, MITRE ATT&CK mapping, trojan detection via devstral-2
REST API
JSON API with search, filtering, pagination -- integrate into your security tools
RSS Feeds
Recent CVEs, CVEs with exploits, CISA KEV additions -- for your feed reader
4 Themes
Cyan, Amber, Milw0rm tribute, Light Warm -- switch instantly

System Architecture

High-level system view. Use tabs to switch diagrams without leaving this page.

System topology diagram
End-to-end runtime topology from users to app, ingestion, storage, and distribution.
API Limits API Documentation RSS Feed Browse Exploits