Basics of Win32 Shatter Attacks
Step by step guide to privilege escalation using shatter attacks.
Core Impact
Commercial exploit software package with GUI
Ethical Hacking Course
Commerical hacker training course on how to write and use exploits
FrSIRT Exploits Archive
Archive of current 0day exploits from European and Asian sources. French and English language content provided.
Fyodor's Exploit World
A large and descriptive exploit archive organized by affected operating systems.
HoobieNet's Security Exploits
Collection of security exploits for various operating systems.
malware.com
malware - malicious software. The examination of security on the internet.
milw0rm.com
Exploit database separated by exploit type (local, remote, DoS, etc.)
Network Security Archive
A collection of mailing list archives dealing with exploits, vulnerability development and hacking
NGS Research
Series of papers on how to write exploits and discover vulnerabilities
Phenoelit
FX's tools page, concentrates on network device exploits (IOS, etc.)