SearchSploit version bump (v3.4) & Update for OSX support since #23
This commit is contained in:
parent
1ee59272f8
commit
f2bad1410c
2 changed files with 12 additions and 11 deletions
11
README.md
11
README.md
|
@ -42,17 +42,18 @@ Example:
|
|||
* Remove false positives (especially when searching numbers/major versions).
|
||||
* When updating from git or displaying help, search terms will be ignored.
|
||||
|
||||
root@kali:~#
|
||||
root@kali:~# searchsploit afd windows local
|
||||
--------------------------------------------------------------------------------- ----------------------------------
|
||||
Exploit Title | Path
|
||||
| (/usr/share/exploitdb/platforms)
|
||||
--------------------------------------------------------------------------------- ----------------------------------
|
||||
Microsoft Windows 2003/XP - AFD.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt
|
||||
Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | ./windows/dos/17133.c
|
||||
Microsoft Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (MS11-080)| ./windows/local/18176.py
|
||||
Microsoft Windows 2003/XP - afd.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt
|
||||
Microsoft Windows XP - afd.sys Local Kernel Denial of Service | ./windows/dos/17133.c
|
||||
Microsoft Windows XP/2003 - afd.sys Local Privilege Escalation Exploit (MS11-080)| ./windows/local/18176.py
|
||||
Microsoft Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | ./windows/local/21844.rb
|
||||
Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation (MS14-040) | ./win32/local/39446.py
|
||||
Microsoft Windows 7 x64 - AFD.SYS Privilege Escalation (MS14-040) | ./win64/local/39525.py
|
||||
Microsoft Windows - afd.sys Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py
|
||||
Microsoft Windows 7 (x64) - afd.sys Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py
|
||||
--------------------------------------------------------------------------------- ----------------------------------
|
||||
root@kali:~#
|
||||
```
|
||||
|
|
12
searchsploit
12
searchsploit
|
@ -1,6 +1,6 @@
|
|||
#!/bin/bash
|
||||
# Name: SearchSploit - Exploit-DB's CLI search tool
|
||||
# Version: 3.3 (Release date: 2016-04-02)
|
||||
# Version: 3.4 (Release date: 2016-08-17)
|
||||
# Written by: Offensive Security, Unix-Ninja & g0tmi1k
|
||||
# Homepage: https://github.com/offensive-security/exploit-database
|
||||
#
|
||||
|
@ -12,7 +12,7 @@
|
|||
|
||||
|
||||
## OS settings
|
||||
gitpath=$(dirname "$(readlink "$0")")
|
||||
gitpath="${0%/*}"
|
||||
csvpath="${gitpath}/files.csv"
|
||||
|
||||
|
||||
|
@ -42,10 +42,10 @@ SEARCH=""
|
|||
LANG=C
|
||||
|
||||
|
||||
## If files.csv is in the searchsploit path, use that instead
|
||||
if [[ -f "$( dirname "$0" )/files.csv" ]]; then
|
||||
gitpath="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
|
||||
csvpath="${gitpath}/files.csv"
|
||||
## If we cannot find files.csv in ${gitpath}
|
||||
if [[ ! -f "${csvpath}" ]]; then
|
||||
echo '[!] Could not find: ' ${csvpath}
|
||||
exit 1
|
||||
fi
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue