diff --git a/README.md b/README.md index a8037c218..d1cc8bce1 100755 --- a/README.md +++ b/README.md @@ -8,6 +8,7 @@ The Exploit Database is an archive of public exploits and corresponding vulnerab This repository is updated daily with the most recently added submissions. Any additional resources can be found in our [binary sploits repository](https://github.com/offensive-security/exploit-database-bin-sploits). Included with this repository is the **searchsploit** utility, which will allow you to search through the exploits using one or more terms. +For more information, please see the [SearchSploit manual](https://www.exploit-db.com/searchsploit/). ``` root@kali:~# searchsploit -h @@ -56,7 +57,7 @@ root@kali:~# searchsploit afd windows local | (/usr/share/exploitdb/platforms) --------------------------------------------------------------------------------- ---------------------------------- Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt -Microsoft Windows XP - afd.sys Local Kernel Denial of Service | ./windows/dos/17133.c +Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py diff --git a/searchsploit b/searchsploit index 9a771d88c..f8dd5e3ce 100755 --- a/searchsploit +++ b/searchsploit @@ -12,7 +12,7 @@ ## OS settings (get the path of where the script is stored + database file) -gitpath="$( cd "$( dirname "$(realpath ${BASH_SOURCE[0]})" )" && pwd)" +gitpath="/opt/exploit-database" csvpath="${gitpath}/files.csv"