sploitus.com
Open in
urlscan Pro
2606:4700:3037::6815:1e3a
Public Scan
Submitted URL: http://sploitus.com/
Effective URL: https://sploitus.com/
Submission: On February 29 via manual from US — Scanned from DE
Effective URL: https://sploitus.com/
Submission: On February 29 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOM<form class="theme-toggle">
<div class="form-group">
<label class="form-switch is-error tooltip" data-tooltip="turn on the dark mode">
<input type="checkbox" checked="" id="theme-toggle"> Dark Mode <i class="form-icon"></i>
</label>
</div>
</form>
<form id="search-form">
<fieldset id="formfield">
<div class="input-group">
<input name="query" id="query" spellcheck="false" autocomplete="off" class="form-input" type="text" required="">
<button class="btn btn-primary input-group-btn">Search</button>
</div>
<label class="form-switch tooltip" data-tooltip="Search JUST the exploit title">
<input type="checkbox" id="is-title">
<i class="form-icon"></i>
<span class="tooltip-content">Title only</span>
</label>
</fieldset>
</form>
Text Content
Dark Mode SPLOITUS Search Title only * Exploits * Tools Sort by default date score EXPLOITS OF THE WEEK Exploit for CVE-2024-25600Exploit for OS Command Injection in Apache SparkExploit for Vulnerability in MetabaseExploit for CVE-2024-22532QNAP QTS / QuTS Hero Unauthenticated Remote Code Execution ExploitSitePad 1.8.2 Cross Site ScriptingFreeIPA 4.10.1 Denial Of Service / Information DisclosureCMS Made Simple 2.2.19 Server-Side Template InjectionExploit for Vulnerability in MicrosoftDotclear 2.29 Cross Site Scripting Share Copy All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement. Twitter RSS/Atom powered by