commands.sh

searchsploit

all

Search Exploit Database for exploits, shellcodes and/or papers. If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown.

More info →

Options (4)

-w, --wwwboolean

Show the exploit-db link to the found resources

Example: searchsploit {{[-w|--www]}} {{search_terms}}
-m, --mirrorboolean

Copy the resource to the current directory (requires the number of the exploit)

Example: searchsploit {{[-m|--mirror]}} {{exploit_number}}
-x, --examineboolean

Examine the resource, using the pager defined in the `$PAGER` environment variable

Example: searchsploit {{[-x|--examine]}} {{exploit_number}}
-u, --updateboolean

Update the local Exploit Database

Example: searchsploit {{[-u|--update]}}

Examples (8)

Search for an exploit, shellcode, or paper

searchsploit search_terms

Search for a known specific version, e.g. sudo version 1.8.27

Show the exploit-db link to the found resources

searchsploit [-w|--www] search_terms

Copy the resource to the current directory (requires the number of the exploit)

searchsploit [-m|--mirror] exploit_number

Examine the resource, using the pager defined in the `$PAGER` environment variable

searchsploit [-x|--examine] exploit_number

Update the local Exploit Database

searchsploit [-u|--update]

Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value

searchsploit --cve 2021-44228

Check results in `nmap`'s XML output with service version (`nmap -sV -oX nmap-output.xml`) for known exploits

searchsploit --nmap path/to/nmap-output.xml
made by @shridhargupta | data from tldr-pages