SearchSploit v4.0.1 - Minor bugs fixes
This commit is contained in:
parent
b7c71cdfb9
commit
ac2c9fab6b
2 changed files with 16 additions and 9 deletions
17
README.md
17
README.md
|
@ -14,9 +14,11 @@ This repository is updated daily with the most recently added submissions. Any a
|
||||||
|
|
||||||
Exploits are located in the `/exploit/` directory, shellcodes can be found in the `/shellcode/` directory.
|
Exploits are located in the `/exploit/` directory, shellcodes can be found in the `/shellcode/` directory.
|
||||||
|
|
||||||
|
- - -
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
This project is released under "[GNU General Public License v2.0](https://github.com/offensive-security/exploit-database/blob/master/LICENSE.md)".
|
This project (and SearchSploit) is released under "[GNU General Public License v2.0](https://github.com/offensive-security/exploit-database/blob/master/LICENSE.md)".
|
||||||
|
|
||||||
- - -
|
- - -
|
||||||
|
|
||||||
|
@ -75,16 +77,15 @@ root@kali:~# searchsploit -h
|
||||||
|
|
||||||
root@kali:~#
|
root@kali:~#
|
||||||
root@kali:~# searchsploit afd windows local
|
root@kali:~# searchsploit afd windows local
|
||||||
|
|
||||||
---------------------------------------------------------------------------------------- -----------------------------------
|
---------------------------------------------------------------------------------------- -----------------------------------
|
||||||
Exploit Title | Path
|
Exploit Title | Path
|
||||||
| (/usr/share/exploitdb/)
|
| (/usr/share/exploitdb/)
|
||||||
---------------------------------------------------------------------------------------- -----------------------------------
|
---------------------------------------------------------------------------------------- -----------------------------------
|
||||||
Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) | exploits/win_x86/local/40564.c
|
Microsoft Windows (x86) - 'afd.sys' Local Privilege Escalation (MS11-046) | exploits/windows_x86/local/40564.c
|
||||||
Microsoft Windows - 'AfdJoinLeaf' Local Privilege Escalation (MS11-080) (Metasploit) | exploits/windows/local/21844.rb
|
Microsoft Windows - 'AfdJoinLeaf' Local Privilege Escalation (MS11-080) (Metasploit) | exploits/windows/local/21844.rb
|
||||||
Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) | exploits/windows/dos/18755.c
|
Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) | exploits/windows/dos/18755.c
|
||||||
Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/win_x86-64/local/39525.py
|
Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/windows_x86-64/local/39525.py
|
||||||
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/win_x86/local/39446.py
|
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | exploits/windows_x86/local/39446.py
|
||||||
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | exploits/windows/dos/17133.c
|
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | exploits/windows/dos/17133.c
|
||||||
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (K-plugin) (MS08-066) | exploits/windows/local/6757.txt
|
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (K-plugin) (MS08-066) | exploits/windows/local/6757.txt
|
||||||
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (MS11-080) | exploits/windows/local/18176.py
|
Microsoft Windows XP/2003 - 'afd.sys' Local Privilege Escalation (MS11-080) | exploits/windows/local/18176.py
|
||||||
|
@ -94,13 +95,15 @@ root@kali:~#
|
||||||
root@kali:~# searchsploit -p 39446
|
root@kali:~# searchsploit -p 39446
|
||||||
Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
|
Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
|
||||||
URL: https://www.exploit-db.com/exploits/39446/
|
URL: https://www.exploit-db.com/exploits/39446/
|
||||||
Path: /usr/share/exploitdb/exploits/win_x86/local/39446.py
|
Path: /usr/share/exploitdb/exploits/windows_x86/local/39446.py
|
||||||
File Type: Python script, ASCII text executable, with CRLF line terminators
|
File Type: Python script, ASCII text executable, with CRLF line terminators
|
||||||
|
|
||||||
Copied EDB-ID #39446's path to the clipboard.
|
Copied EDB-ID #39446's path to the clipboard.
|
||||||
root@kali:~#
|
root@kali:~#
|
||||||
```
|
```
|
||||||
|
|
||||||
|
- - -
|
||||||
|
|
||||||
## Install
|
## Install
|
||||||
|
|
||||||
SearchSploit requires either "CoreUtils" or "utilities" (e.g. `bash`, `sed`, `grep`, `awk`, etc.) for the core features to work.
|
SearchSploit requires either "CoreUtils" or "utilities" (e.g. `bash`, `sed`, `grep`, `awk`, etc.) for the core features to work.
|
||||||
|
@ -132,6 +135,8 @@ $ sudo ln -sf /opt/exploit-database/searchsploit /usr/local/bin/searchsploit
|
||||||
$ sed 's|path_array+=(.*)|path_array+=("/opt/exploit-database")|g' /opt/exploit-database/.searchsploit_rc > ~/.searchsploit_rc
|
$ sed 's|path_array+=(.*)|path_array+=("/opt/exploit-database")|g' /opt/exploit-database/.searchsploit_rc > ~/.searchsploit_rc
|
||||||
```
|
```
|
||||||
|
|
||||||
|
- - -
|
||||||
|
|
||||||
## Credit
|
## Credit
|
||||||
|
|
||||||
The following people made this possible:
|
The following people made this possible:
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
# Name: SearchSploit - Exploit-DB's CLI search tool
|
# Name: SearchSploit - Exploit-DB's CLI search tool
|
||||||
# Version: 4.0.0 (Release date: 2018-01-23)
|
# Version: 4.0.1 (Release date: 2018-01-24)
|
||||||
# Written by: Offensive Security, Unix-Ninja, and g0tmi1k
|
# Written by: Offensive Security, Unix-Ninja, and g0tmi1k
|
||||||
# Homepage: https://github.com/offensive-security/exploit-database
|
# Homepage: https://github.com/offensive-security/exploit-database
|
||||||
# Manual: https://www.exploit-db.com/searchsploit/
|
# Manual: https://www.exploit-db.com/searchsploit/
|
||||||
|
@ -470,7 +470,7 @@ function findresults()
|
||||||
|
|
||||||
|
|
||||||
## Dynamically set column widths to the current screen size
|
## Dynamically set column widths to the current screen size
|
||||||
[[ "${WEBLINK}" -eq 1 ]] && COL2=45 || COL2=$(( ${#path_in} + 20 ))
|
[[ "${WEBLINK}" -eq 1 ]] && COL2=45 || COL2=$(( ${#path_in} + 21 ))
|
||||||
COL1=$(( $( tput cols ) - COL2 - 1 ))
|
COL1=$(( $( tput cols ) - COL2 - 1 ))
|
||||||
|
|
||||||
|
|
||||||
|
@ -700,11 +700,13 @@ for (( i=0; i<${arraylength}; i++ )); do
|
||||||
echo "[i] Found (#1): $(cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd)/${files_array[${i}]}"
|
echo "[i] Found (#1): $(cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd)/${files_array[${i}]}"
|
||||||
echo "[i] To remove this message, please edit \"${rc_file}\" for \"${files_array[${i}]}\" (package_array: ${package_array[${i}]})"
|
echo "[i] To remove this message, please edit \"${rc_file}\" for \"${files_array[${i}]}\" (package_array: ${package_array[${i}]})"
|
||||||
path_array[${i}]="$(cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd)"
|
path_array[${i}]="$(cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd)"
|
||||||
|
echo
|
||||||
## Method #2 - Symbolic link
|
## Method #2 - Symbolic link
|
||||||
elif [[ -f "$(dirname "$(readlink "$0")")/${files_array[${i}]}" ]]; then
|
elif [[ -f "$(dirname "$(readlink "$0")")/${files_array[${i}]}" ]]; then
|
||||||
echo "[i] Found (#2): $(dirname "$(readlink "$0")")/${files_array[${i}]}"
|
echo "[i] Found (#2): $(dirname "$(readlink "$0")")/${files_array[${i}]}"
|
||||||
echo "[i] To remove this message, please edit \"${rc_file}\" for \"${files_array[${i}]}\" (package_array: ${package_array[${i}]})"
|
echo "[i] To remove this message, please edit \"${rc_file}\" for \"${files_array[${i}]}\" (package_array: ${package_array[${i}]})"
|
||||||
path_array[${i}]="$(dirname "$(readlink "$0")")"
|
path_array[${i}]="$(dirname "$(readlink "$0")")"
|
||||||
|
echo
|
||||||
else
|
else
|
||||||
#echo "[!] Could not find: ${files}"
|
#echo "[!] Could not find: ${files}"
|
||||||
#echo "[i] To remove this message, please remove \"${files_array[${i}]}\" (package_array: ${package_array[${i}]}) from \"${rc_file}\""
|
#echo "[i] To remove this message, please remove \"${files_array[${i}]}\" (package_array: ${package_array[${i}]}) from \"${rc_file}\""
|
||||||
|
@ -713,8 +715,8 @@ for (( i=0; i<${arraylength}; i++ )); do
|
||||||
unset "name_array[${i}]"
|
unset "name_array[${i}]"
|
||||||
unset "git_array[${i}]"
|
unset "git_array[${i}]"
|
||||||
unset "package_array[${i}]"
|
unset "package_array[${i}]"
|
||||||
|
#echo
|
||||||
fi
|
fi
|
||||||
echo
|
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue