searchsploit
Search Exploit Database for exploits, shellcodes and/or papers. If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown. More information: https://www.exploit-db.com/searchsploit.
- Search for an exploit, shellcode, or paper:
searchsploit search_terms
- Search for a known specific version, e.g. sudo version 1.8.27:
searchsploit sudo 1.8.27
- Show the exploit-db link to the found resources:
searchsploit --www search_terms
- Copy ([m]irror) the resource to the current directory (requires the number of the exploit):
searchsploit --mirror exploit_number
- E[x]amine the resource, using the pager defined in the
$PAGERenvironment variable:
searchsploit --examine exploit_number
- [u]pdate the local Exploit Database:
searchsploit --update
- Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value:
searchsploit --cve 2021-44228
- Check results in
nmap's XML output with service version (nmap -sV -oX nmap-output.xml) for known exploits:
searchsploit --nmap path/to/nmap-output.xml