From f2bad1410c10b932c218307f939dd017094577b3 Mon Sep 17 00:00:00 2001 From: g0tmi1k Date: Wed, 17 Aug 2016 17:31:09 +0100 Subject: [PATCH] SearchSploit version bump (v3.4) & Update for OSX support since #23 --- README.md | 11 ++++++----- searchsploit | 12 ++++++------ 2 files changed, 12 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 49180afa5..9ba9a008c 100755 --- a/README.md +++ b/README.md @@ -42,17 +42,18 @@ Example: * Remove false positives (especially when searching numbers/major versions). * When updating from git or displaying help, search terms will be ignored. +root@kali:~# root@kali:~# searchsploit afd windows local --------------------------------------------------------------------------------- ---------------------------------- Exploit Title | Path | (/usr/share/exploitdb/platforms) --------------------------------------------------------------------------------- ---------------------------------- -Microsoft Windows 2003/XP - AFD.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt -Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | ./windows/dos/17133.c -Microsoft Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (MS11-080)| ./windows/local/18176.py +Microsoft Windows 2003/XP - afd.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt +Microsoft Windows XP - afd.sys Local Kernel Denial of Service | ./windows/dos/17133.c +Microsoft Windows XP/2003 - afd.sys Local Privilege Escalation Exploit (MS11-080)| ./windows/local/18176.py Microsoft Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | ./windows/local/21844.rb -Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation (MS14-040) | ./win32/local/39446.py -Microsoft Windows 7 x64 - AFD.SYS Privilege Escalation (MS14-040) | ./win64/local/39525.py +Microsoft Windows - afd.sys Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py +Microsoft Windows 7 (x64) - afd.sys Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py --------------------------------------------------------------------------------- ---------------------------------- root@kali:~# ``` diff --git a/searchsploit b/searchsploit index 0f292c613..482557c4e 100755 --- a/searchsploit +++ b/searchsploit @@ -1,6 +1,6 @@ #!/bin/bash # Name: SearchSploit - Exploit-DB's CLI search tool -# Version: 3.3 (Release date: 2016-04-02) +# Version: 3.4 (Release date: 2016-08-17) # Written by: Offensive Security, Unix-Ninja & g0tmi1k # Homepage: https://github.com/offensive-security/exploit-database # @@ -12,7 +12,7 @@ ## OS settings -gitpath=$(dirname "$(readlink "$0")") +gitpath="${0%/*}" csvpath="${gitpath}/files.csv" @@ -42,10 +42,10 @@ SEARCH="" LANG=C -## If files.csv is in the searchsploit path, use that instead -if [[ -f "$( dirname "$0" )/files.csv" ]]; then - gitpath="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" - csvpath="${gitpath}/files.csv" +## If we cannot find files.csv in ${gitpath} +if [[ ! -f "${csvpath}" ]]; then + echo '[!] Could not find: ' ${csvpath} + exit 1 fi