tldr/pages/common/searchsploit.md

1.2 KiB

searchsploit

Search Exploit Database for exploits, shellcodes and/or papers. If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown. More information: https://www.exploit-db.com/searchsploit.

  • Search for an exploit, shellcode, or paper:

searchsploit {{search_terms}}

  • Search for a known specific version, e.g. sudo version 1.8.27:

searchsploit sudo 1.8.27

  • Show the exploit-db link to the found resources:

searchsploit --www {{search_terms}}

  • Copy ([m]irror) the resource to the current directory (requires the number of the exploit):

searchsploit --mirror {{exploit_number}}

  • Eamine the resource, using the pager defined in the $PAGER environment variable:

searchsploit --examine {{exploit_number}}

  • [u]pdate the local Exploit Database:

searchsploit --update

  • Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value:

searchsploit --cve {{2021-44228}}

  • Check results in nmap's XML output with service version (nmap -sV -oX nmap-output.xml) for known exploits:

searchsploit --nmap {{path/to/nmap-output.xml}}