From e5938fe9005c2965d3c3ce97bdc3fc799c51b2c4 Mon Sep 17 00:00:00 2001 From: g0tmi1k Date: Wed, 26 Oct 2016 13:09:02 +0100 Subject: [PATCH 1/2] Add a link to the SearchSploit Manual --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index a8037c218..d1cc8bce1 100755 --- a/README.md +++ b/README.md @@ -8,6 +8,7 @@ The Exploit Database is an archive of public exploits and corresponding vulnerab This repository is updated daily with the most recently added submissions. Any additional resources can be found in our [binary sploits repository](https://github.com/offensive-security/exploit-database-bin-sploits). Included with this repository is the **searchsploit** utility, which will allow you to search through the exploits using one or more terms. +For more information, please see the [SearchSploit manual](https://www.exploit-db.com/searchsploit/). ``` root@kali:~# searchsploit -h @@ -56,7 +57,7 @@ root@kali:~# searchsploit afd windows local | (/usr/share/exploitdb/platforms) --------------------------------------------------------------------------------- ---------------------------------- Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt -Microsoft Windows XP - afd.sys Local Kernel Denial of Service | ./windows/dos/17133.c +Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py From c1fe53ce4ba7351278cbf9c511863625b37d853b Mon Sep 17 00:00:00 2001 From: g0tmi1k Date: Wed, 26 Oct 2016 13:13:51 +0100 Subject: [PATCH 2/2] Hardcode ${gitpath} path --- searchsploit | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/searchsploit b/searchsploit index 9a771d88c..f8dd5e3ce 100755 --- a/searchsploit +++ b/searchsploit @@ -12,7 +12,7 @@ ## OS settings (get the path of where the script is stored + database file) -gitpath="$( cd "$( dirname "$(realpath ${BASH_SOURCE[0]})" )" && pwd)" +gitpath="/opt/exploit-database" csvpath="${gitpath}/files.csv"