Merge pull request #56 from g0tmi1k/searchsploit

Link to the SearchSploit Manual
This commit is contained in:
g0tmi1k 2016-10-26 16:04:57 +01:00 committed by GitHub
commit 5834a2391c
2 changed files with 3 additions and 2 deletions

View file

@ -8,6 +8,7 @@ The Exploit Database is an archive of public exploits and corresponding vulnerab
This repository is updated daily with the most recently added submissions. Any additional resources can be found in our [binary sploits repository](https://github.com/offensive-security/exploit-database-bin-sploits).
Included with this repository is the **searchsploit** utility, which will allow you to search through the exploits using one or more terms.
For more information, please see the [SearchSploit manual](https://www.exploit-db.com/searchsploit/).
```
root@kali:~# searchsploit -h
@ -56,7 +57,7 @@ root@kali:~# searchsploit afd windows local
| (/usr/share/exploitdb/platforms)
--------------------------------------------------------------------------------- ----------------------------------
Microsoft Windows 2003/XP - 'afd.sys' Privilege Escalation (K-plugin) | ./windows/local/6757.txt
Microsoft Windows XP - afd.sys Local Kernel Denial of Service | ./windows/dos/17133.c
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | ./windows/dos/17133.c
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | ./windows/local/18176.py
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) | ./windows/local/21844.rb
Microsoft Windows - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py

View file

@ -12,7 +12,7 @@
## OS settings (get the path of where the script is stored + database file)
gitpath="$( cd "$( dirname "$(realpath ${BASH_SOURCE[0]})" )" && pwd)"
gitpath="/opt/exploit-database"
csvpath="${gitpath}/files.csv"