tldr/pages/common/searchsploit.md

38 lines
1.2 KiB
Markdown

# searchsploit
> Search Exploit Database for exploits, shellcodes and/or papers.
> If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown.
> More information: <https://www.exploit-db.com/searchsploit>.
- Search for an exploit, shellcode, or paper:
`searchsploit {{search_terms}}`
- Search for a known specific version, e.g. sudo version 1.8.27:
`searchsploit sudo 1.8.27`
- Show the exploit-db link to the found resources:
`searchsploit --www {{search_terms}}`
- Copy ([m]irror) the resource to the current directory (requires the number of the exploit):
`searchsploit --mirror {{exploit_number}}`
- E[x]amine the resource, using the pager defined in the `$PAGER` environment variable:
`searchsploit --examine {{exploit_number}}`
- [u]pdate the local Exploit Database:
`searchsploit --update`
- Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value:
`searchsploit --cve {{2021-44228}}`
- Check results in `nmap`'s XML output with service version (`nmap -sV -oX nmap-output.xml`) for known exploits:
`searchsploit --nmap {{path/to/nmap-output.xml}}`