Update README for v4.1
This commit is contained in:
parent
23e40674cb
commit
830465d5a9
1 changed files with 43 additions and 28 deletions
71
README.md
71
README.md
|
@ -30,7 +30,7 @@ For more information, please see the **[SearchSploit manual](https://www.exploit
|
||||||
## Usage/Example
|
## Usage/Example
|
||||||
|
|
||||||
```
|
```
|
||||||
root@kali:~# searchsploit -h
|
kali@kali:~$ searchsploit -h
|
||||||
Usage: searchsploit [options] term1 [term2] ... [termN]
|
Usage: searchsploit [options] term1 [term2] ... [termN]
|
||||||
|
|
||||||
==========
|
==========
|
||||||
|
@ -39,7 +39,7 @@ root@kali:~# searchsploit -h
|
||||||
searchsploit afd windows local
|
searchsploit afd windows local
|
||||||
searchsploit -t oracle windows
|
searchsploit -t oracle windows
|
||||||
searchsploit -p 39446
|
searchsploit -p 39446
|
||||||
searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"
|
searchsploit linux kernel 3.2 -s --exclude="(PoC)|/dos/"
|
||||||
searchsploit linux reverse password
|
searchsploit linux reverse password
|
||||||
|
|
||||||
For more examples, see the manual: https://www.exploit-db.com/searchsploit
|
For more examples, see the manual: https://www.exploit-db.com/searchsploit
|
||||||
|
@ -47,34 +47,49 @@ root@kali:~# searchsploit -h
|
||||||
=========
|
=========
|
||||||
Options
|
Options
|
||||||
=========
|
=========
|
||||||
-c, --case [Term] Perform a case-sensitive search (Default is inSEnsITiVe).
|
## Search Terms
|
||||||
-e, --exact [Term] Perform an EXACT match on exploit title (Default is AND) [Implies "-t"].
|
-c, --case [Term] Perform a case-sensitive search (Default is inSEnsITiVe)
|
||||||
-h, --help Show this help screen.
|
-e, --exact [Term] Perform an EXACT & order match on exploit title (Default is an AND match on each term) [Implies "-t"]
|
||||||
-j, --json [Term] Show result in JSON format.
|
e.g. "WordPress 4.1" would not be detect "WordPress Core 4.1")
|
||||||
-m, --mirror [EDB-ID] Mirror (aka copies) an exploit to the current working directory.
|
-s, --strict Perform a strict search, so input values must exist, disabling fuzzy search for version range
|
||||||
-o, --overflow [Term] Exploit titles are allowed to overflow their columns.
|
e.g. "1.1" would not be detected in "1.0 < 1.3")
|
||||||
-p, --path [EDB-ID] Show the full path to an exploit (and also copies the path to the clipboard if possible).
|
-t, --title [Term] Search JUST the exploit title (Default is title AND the file's path)
|
||||||
-t, --title [Term] Search JUST the exploit title (Default is title AND the file's path).
|
--exclude="term" Remove values from results. By using "|" to separate, you can chain multiple values
|
||||||
-u, --update Check for and install any exploitdb package updates (deb or git).
|
e.g. --exclude="term1|term2|term3"
|
||||||
-w, --www [Term] Show URLs to Exploit-DB.com rather than the local path.
|
|
||||||
-x, --examine [EDB-ID] Examine (aka opens) the exploit using $PAGER.
|
## Output
|
||||||
--colour Disable colour highlighting in search results.
|
-j, --json [Term] Show result in JSON format
|
||||||
--id Display the EDB-ID value rather than local path.
|
-o, --overflow [Term] Exploit titles are allowed to overflow their columns
|
||||||
--nmap [file.xml] Checks all results in Nmap's XML output with service version (e.g.: nmap -sV -oX file.xml).
|
-p, --path [EDB-ID] Show the full path to an exploit (and also copies the path to the clipboard if possible)
|
||||||
Use "-v" (verbose) to try even more combinations
|
-v, --verbose Display more information in output
|
||||||
--exclude="term" Remove values from results. By using "|" to separate, you can chain multiple values.
|
-w, --www [Term] Show URLs to Exploit-DB.com rather than the local path
|
||||||
e.g. --exclude="term1|term2|term3".
|
--id Display the EDB-ID value rather than local path
|
||||||
|
--colour Disable colour highlighting in search results
|
||||||
|
|
||||||
|
## Non-Searching
|
||||||
|
-m, --mirror [EDB-ID] Mirror (aka copies) an exploit to the current working directory
|
||||||
|
-x, --examine [EDB-ID] Examine (aka opens) the exploit using $PAGER
|
||||||
|
|
||||||
|
## Non-Searching
|
||||||
|
-h, --help Show this help screen
|
||||||
|
-u, --update Check for and install any exploitdb package updates (brew, deb & git)
|
||||||
|
|
||||||
|
## Automation
|
||||||
|
--nmap [file.xml] Checks all results in Nmap's XML output with service version
|
||||||
|
e.g.: nmap [host] -sV -oX file.xml
|
||||||
|
|
||||||
=======
|
=======
|
||||||
Notes
|
Notes
|
||||||
=======
|
=======
|
||||||
* You can use any number of search terms.
|
* You can use any number of search terms
|
||||||
* Search terms are not case-sensitive (by default), and ordering is irrelevant.
|
* By default, search terms are not case-sensitive, ordering is irrelevant, and will search between version ranges
|
||||||
* Use '-c' if you wish to reduce results by case-sensitive searching.
|
* Use '-c' if you wish to reduce results by case-sensitive searching
|
||||||
* And/Or '-e' if you wish to filter results by using an exact match.
|
* And/Or '-e' if you wish to filter results by using an exact match
|
||||||
* Use '-t' to exclude the file's path to filter the search results.
|
* And/Or '-s' if you wish to look for an exact version match
|
||||||
* Remove false positives (especially when searching using numbers - i.e. versions).
|
* Use '-t' to exclude the file's path to filter the search results
|
||||||
* When updating or displaying help, search terms will be ignored.
|
* Remove false positives (especially when searching using numbers - i.e. versions)
|
||||||
|
* When using '--nmap', adding '-v' (verbose), it will search for even more combinations
|
||||||
|
* When updating or displaying help, search terms will be ignored
|
||||||
|
|
||||||
root@kali:~#
|
root@kali:~#
|
||||||
root@kali:~# searchsploit afd windows local
|
root@kali:~# searchsploit afd windows local
|
||||||
|
@ -117,13 +132,13 @@ You can find a **more in-depth guide in the [SearchSploit manual](https://www.ex
|
||||||
Exploit-DB/SearchSploit is already packaged inside of Kali-Linux. A method of installation is:
|
Exploit-DB/SearchSploit is already packaged inside of Kali-Linux. A method of installation is:
|
||||||
|
|
||||||
```
|
```
|
||||||
root@kali:~# apt -y install exploitdb
|
kali@kali:~$ sudo apt -y install exploitdb
|
||||||
```
|
```
|
||||||
|
|
||||||
_NOTE: Optional is to install the additional packages:_
|
_NOTE: Optional is to install the additional packages:_
|
||||||
|
|
||||||
```
|
```
|
||||||
root@kali:~# apt -y install exploitdb-bin-sploits exploitdb-papers
|
kali@kali:~$ sudo apt -y install exploitdb-bin-sploits exploitdb-papers
|
||||||
```
|
```
|
||||||
|
|
||||||
**Git**
|
**Git**
|
||||||
|
|
Loading…
Add table
Reference in a new issue