searchsploit
Search Exploit Database for exploits, shellcodes and/or papers. If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown.
More info →Options (4)
-w, --wwwbooleanShow the exploit-db link to the found resources
searchsploit {{[-w|--www]}} {{search_terms}}-m, --mirrorbooleanCopy the resource to the current directory (requires the number of the exploit)
searchsploit {{[-m|--mirror]}} {{exploit_number}}-x, --examinebooleanExamine the resource, using the pager defined in the `$PAGER` environment variable
searchsploit {{[-x|--examine]}} {{exploit_number}}-u, --updatebooleanUpdate the local Exploit Database
searchsploit {{[-u|--update]}}Examples (8)
Search for an exploit, shellcode, or paper
searchsploit search_termsSearch for a known specific version, e.g. sudo version 1.8.27
searchsploit sudo 1.8.27Show the exploit-db link to the found resources
searchsploit [-w|--www] search_termsCopy the resource to the current directory (requires the number of the exploit)
searchsploit [-m|--mirror] exploit_numberExamine the resource, using the pager defined in the `$PAGER` environment variable
searchsploit [-x|--examine] exploit_numberUpdate the local Exploit Database
searchsploit [-u|--update]Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value
searchsploit --cve 2021-44228Check results in `nmap`'s XML output with service version (`nmap -sV -oX nmap-output.xml`) for known exploits
searchsploit --nmap path/to/nmap-output.xml