mirror of https://github.com/CrimsonTome/tldr.git
38 lines
1.2 KiB
Markdown
38 lines
1.2 KiB
Markdown
# searchsploit
|
|
|
|
> Search Exploit Database for exploits, shellcodes and/or papers.
|
|
> If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown.
|
|
> More information: <https://www.exploit-db.com/searchsploit>.
|
|
|
|
- Search for an exploit, shellcode, or paper:
|
|
|
|
`searchsploit {{search_terms}}`
|
|
|
|
- Search for a known specific version, e.g. sudo version 1.8.27:
|
|
|
|
`searchsploit sudo 1.8.27`
|
|
|
|
- Show the exploit-db link to the found resources:
|
|
|
|
`searchsploit --www {{search_terms}}`
|
|
|
|
- Copy ([m]irror) the resource to the current directory (requires the number of the exploit):
|
|
|
|
`searchsploit --mirror {{exploit_number}}`
|
|
|
|
- E[x]amine the resource, using the pager defined in the `$PAGER` environment variable:
|
|
|
|
`searchsploit --examine {{exploit_number}}`
|
|
|
|
- [u]pdate the local Exploit Database:
|
|
|
|
`searchsploit --update`
|
|
|
|
- Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value:
|
|
|
|
`searchsploit --cve {{2021-44228}}`
|
|
|
|
- Check results in `nmap`'s XML output with service version (`nmap -sV -oX nmap-output.xml`) for known exploits:
|
|
|
|
`searchsploit --nmap {{path/to/nmap-output.xml}}`
|