README - Updated to match the new SearchSploit

This commit is contained in:
g0tmi1k 2015-06-11 16:14:29 +01:00
parent 5aabf25b26
commit 888ca2dd0e

View file

@ -1,41 +1,52 @@
The Exploit-Database Git Repository The Exploit-Database Git Repository
=================================== ===================================
This is the official repository of [The Exploit Database](http://www.exploit-db.com), a project sponsored by [Offensive Security](https://www.offensive-security.com). This is the official repository of [The Exploit Database](http://www.exploit-db.com/), a project sponsored by [Offensive Security](https://www.offensive-security.com/).
The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away. The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.
This repository is updated daily with the most recently added submissions. This repository is updated daily with the most recently added submissions. Any additional resources can be found in our [binary sploits repository](https://github.com/offensive-security/exploit-database-bin-sploits).
Included with this repository is the **searchsploit** utility, which will allow you to search through the exploits using one or more terms. Included with this repository is the **searchsploit** utility, which will allow you to search through the exploits using one or more terms.
``` ```
root@kali:~# searchsploit -h root@kali:~# searchsploit -h
Usage : searchsploit [OPTIONS] term1 [term2] ... [termN] Usage: searchsploit [OPTIONS] term1 [term2] ... [termN]
Example: searchsploit oracle windows local Example:
searchsploit afd windows local
searchsploit -f oracle windows remote
========= =========
OPTIONS Options
========= =========
-c - Perform case-sensitive searches; by default, -c, --case Perform case-sensitive searches (Default is insensitive).
searches will try to be greedy -f, --file Searches include file's path (Default is just the exploit title).
-v - By setting verbose output, description lines -h, --help Show this help screen.
are allowed to overflow their columns -u, --update Update Database from git.
-h, --help - Show help screen -v, --verbose Verbose output. Title lines are allowed to overflow their columns.
-w, --www Show URLs to Exploit-DB.com rather than local path.
--colour Disables colour highlighting on match.
--id Display EDB-ID value rather than local path.
NOTES: =======
- Use any number of search terms you would like (minimum: 1) Notes
- Search terms are not case sensitive, and order is irrelevant =======
* Use any number of search terms you would like (at least 1 value), in any order.
* Search terms are not case sensitive, and order is irrelevant.
* Use '-c' if you wish to reduce results by case-sensitive searching.
* Use '-f' to include the file's path to increase the search results.
* Could possibly increase false positives (especially when searching numbers).
* When updating from git or displaying help, searches will be ignored.
root@kali:~# searchsploit afd windows local root@kali:~# searchsploit -f afd windows local
----------------------------------------------------------------|---------------------------------- ------------------------------------------------------------ ----------------------------------
Description | Path Exploit Title | Path
----------------------------------------------------------------|---------------------------------- | (/usr/share/exploitdb/platforms)
MS Windows XP/2003 AFD.sys Privilege Escalation Exploit (K-plug | /windows/local/6757.txt ------------------------------------------------------------ ----------------------------------
Microsoft Windows xp AFD.sys Local Kernel DoS Exploit | /windows/dos/17133.c MS Windows XP/2003 - AFD.sys Privilege Escalation Exploit (K| /windows/local/6757.txt
Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (M | /windows/local/18176.py Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | /windows/dos/17133.c
Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | /windows/local/21844.rb Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit| /windows/local/18176.py
----------------------------------------------------------------|---------------------------------- Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | /windows/local/21844.rb
------------------------------------------------------------ ----------------------------------
root@kali:~# root@kali:~#
``` ```