New servers added for increased overall performance

May 14, 2015 10:20 GMT  ·  By

Offensive Security has deployed a new version of their public collection of exploits, Exploit Database, integrating a slew of functional improvements, apart from replacing the dark website theme with a white one.

For six years, the exploit repository has been adding new entries on a regular basis, amassing more than 35,000, according to its maintainer.

The archive is intended for penetration testers and vulnerability researchers. It contains full exploits and proof-of-concept code for security holes in different services and applications, collected either via direct submission, mailing lists or other public sources.

Multiple options available for filtering results

The modifications were published about two weeks ago, but the security training company kept silent about the improvements until Wednesday.

Among the changes brought to the new version are support for HTTPS connection (TLS 1.2) and better search and ordering of the results.

Retrieving the answers for the queries should be faster than before, with more relevant results. Filtering options are now available, allowing the user to sort them by date, architecture or other parameters.

On the back-end, the old servers have been rebuilt and new machines have been added to deliver notable overall faster responses. Another contributing factor for better performance is improvement of the cache method on all the systems.

Further improvements planned for future updates

Offensive Security made it easier for clients to access the database from a wider range of devices by adding a user interface for mobile gadgets.

“The new Exploit Database front-end should accommodate everyone’s surfing habits, giving you the same experience whether you’re on a laptop, tablet, or phone,” the company says in a blog post.

To ensure client access to the latest exploits, the communication channels (RSS, Twitter and IRC channel) are now updated on an hourly basis.

Although the new features represent a milestone in the development of Exploit Database, the developers plan further improvements, such as tagging exploits, even better search and statistics.