searchsploit
Search Exploit Database for exploits, shellcodes and/or papers. If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown. More information: https://www.exploit-db.com/searchsploit.
- Search for an exploit, shellcode, or paper:
searchsploit
search_terms
- Search for a known specific version, e.g. sudo version 1.8.27:
searchsploit sudo 1.8.27
- Show the exploit-db link to the found resources:
searchsploit --www
search_terms
- Copy ([m]irror) the resource to the current directory (requires the number of the exploit):
searchsploit --mirror
exploit_number
- E[x]amine the resource, using the pager defined in the
$PAGER
environment variable:
searchsploit --examine
exploit_number
- [u]pdate the local Exploit Database:
searchsploit --update
- Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value:
searchsploit --cve
2021-44228
- Check results in
nmap
's XML output with service version (nmap -sV -oX nmap-output.xml
) for known exploits:
searchsploit --nmap
path/to/nmap-output.xml