README update for new output
This commit is contained in:
parent
a2a942ae0a
commit
2cffa6f07c
1 changed files with 16 additions and 15 deletions
31
README.md
31
README.md
|
@ -39,8 +39,10 @@ kali@kali:~$ searchsploit -h
|
||||||
searchsploit afd windows local
|
searchsploit afd windows local
|
||||||
searchsploit -t oracle windows
|
searchsploit -t oracle windows
|
||||||
searchsploit -p 39446
|
searchsploit -p 39446
|
||||||
searchsploit linux kernel 3.2 -s --exclude="(PoC)|/dos/"
|
searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"
|
||||||
|
searchsploit -s Apache Struts 2.0.0
|
||||||
searchsploit linux reverse password
|
searchsploit linux reverse password
|
||||||
|
searchsploit -j 55555 | json_pp
|
||||||
|
|
||||||
For more examples, see the manual: https://www.exploit-db.com/searchsploit
|
For more examples, see the manual: https://www.exploit-db.com/searchsploit
|
||||||
|
|
||||||
|
@ -91,31 +93,30 @@ kali@kali:~$ searchsploit -h
|
||||||
* When using '--nmap', adding '-v' (verbose), it will search for even more combinations
|
* When using '--nmap', adding '-v' (verbose), it will search for even more combinations
|
||||||
* When updating or displaying help, search terms will be ignored
|
* When updating or displaying help, search terms will be ignored
|
||||||
|
|
||||||
root@kali:~#
|
kali@kali:~$
|
||||||
root@kali:~# searchsploit afd windows local
|
kali@kali:~$ searchsploit afd windows local
|
||||||
---------------------------------------------------------------------------------------- -----------------------------------
|
---------------------------------------------------------------------------------------- -----------------------------------
|
||||||
Exploit Title | Path
|
Exploit Title | Path
|
||||||
| (/usr/share/exploitdb/)
|
|
||||||
---------------------------------------------------------------------------------------- -----------------------------------
|
---------------------------------------------------------------------------------------- -----------------------------------
|
||||||
Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) | exploits/windows_x86/local/40564.c
|
Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) | windows_x86/local/40564.c
|
||||||
Microsoft Windows - 'AfdJoinLeaf' Local Privilege Escalation (MS11-080) (Metasploit) | exploits/windows/local/21844.rb
|
Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) | windows/dos/18755.c
|
||||||
Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) | exploits/windows/dos/18755.c
|
Microsoft Windows - 'AfdJoinLeaf' Local Privilege Escalation (MS11-080) (Metasploit) | windows/local/21844.rb
|
||||||
Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/windows_x86-64/local/39525.py
|
Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | windows_x86-64/local/39525.py
|
||||||
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/windows_x86/local/39446.py
|
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | windows_x86/local/39446.py
|
||||||
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | exploits/windows/dos/17133.c
|
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | windows/dos/17133.c
|
||||||
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (K-plugin) (MS08-066) | exploits/windows/local/6757.txt
|
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (K-plugin) (MS08-066) | windows/local/6757.txt
|
||||||
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (MS11-080) | exploits/windows/local/18176.py
|
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (MS11-080) | windows/local/18176.py
|
||||||
---------------------------------------------------------------------------------------- -----------------------------------
|
---------------------------------------------------------------------------------------- -----------------------------------
|
||||||
Shellcodes: No Result
|
Shellcodes: No Result
|
||||||
root@kali:~#
|
kali@kali:~$
|
||||||
root@kali:~# searchsploit -p 39446
|
kali@kali:~$ searchsploit -p 39446
|
||||||
Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
|
Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
|
||||||
URL: https://www.exploit-db.com/exploits/39446
|
URL: https://www.exploit-db.com/exploits/39446
|
||||||
Path: /usr/share/exploitdb/exploits/windows_x86/local/39446.py
|
Path: /usr/share/exploitdb/exploits/windows_x86/local/39446.py
|
||||||
File Type: Python script, ASCII text executable, with CRLF line terminators
|
File Type: Python script, ASCII text executable, with CRLF line terminators
|
||||||
|
|
||||||
Copied EDB-ID #39446's path to the clipboard.
|
Copied EDB-ID #39446's path to the clipboard.
|
||||||
root@kali:~#
|
kali@kali:~$
|
||||||
```
|
```
|
||||||
|
|
||||||
- - -
|
- - -
|
||||||
|
|
Loading…
Add table
Reference in a new issue