SearchSploit version bump (v3.4) & Update for OSX support since #23

This commit is contained in:
g0tmi1k 2016-08-17 17:31:09 +01:00
parent 1ee59272f8
commit f2bad1410c
2 changed files with 12 additions and 11 deletions

View file

@ -42,17 +42,18 @@ Example:
* Remove false positives (especially when searching numbers/major versions). * Remove false positives (especially when searching numbers/major versions).
* When updating from git or displaying help, search terms will be ignored. * When updating from git or displaying help, search terms will be ignored.
root@kali:~#
root@kali:~# searchsploit afd windows local root@kali:~# searchsploit afd windows local
--------------------------------------------------------------------------------- ---------------------------------- --------------------------------------------------------------------------------- ----------------------------------
Exploit Title | Path Exploit Title | Path
| (/usr/share/exploitdb/platforms) | (/usr/share/exploitdb/platforms)
--------------------------------------------------------------------------------- ---------------------------------- --------------------------------------------------------------------------------- ----------------------------------
Microsoft Windows 2003/XP - AFD.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt Microsoft Windows 2003/XP - afd.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt
Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | ./windows/dos/17133.c Microsoft Windows XP - afd.sys Local Kernel Denial of Service | ./windows/dos/17133.c
Microsoft Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (MS11-080)| ./windows/local/18176.py Microsoft Windows XP/2003 - afd.sys Local Privilege Escalation Exploit (MS11-080)| ./windows/local/18176.py
Microsoft Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | ./windows/local/21844.rb Microsoft Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | ./windows/local/21844.rb
Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation (MS14-040) | ./win32/local/39446.py Microsoft Windows - afd.sys Dangling Pointer Privilege Escalation (MS14-040) | ./win_x86/local/39446.py
Microsoft Windows 7 x64 - AFD.SYS Privilege Escalation (MS14-040) | ./win64/local/39525.py Microsoft Windows 7 (x64) - afd.sys Privilege Escalation (MS14-040) | ./win_x86-64/local/39525.py
--------------------------------------------------------------------------------- ---------------------------------- --------------------------------------------------------------------------------- ----------------------------------
root@kali:~# root@kali:~#
``` ```

View file

@ -1,6 +1,6 @@
#!/bin/bash #!/bin/bash
# Name: SearchSploit - Exploit-DB's CLI search tool # Name: SearchSploit - Exploit-DB's CLI search tool
# Version: 3.3 (Release date: 2016-04-02) # Version: 3.4 (Release date: 2016-08-17)
# Written by: Offensive Security, Unix-Ninja & g0tmi1k # Written by: Offensive Security, Unix-Ninja & g0tmi1k
# Homepage: https://github.com/offensive-security/exploit-database # Homepage: https://github.com/offensive-security/exploit-database
# #
@ -12,7 +12,7 @@
## OS settings ## OS settings
gitpath=$(dirname "$(readlink "$0")") gitpath="${0%/*}"
csvpath="${gitpath}/files.csv" csvpath="${gitpath}/files.csv"
@ -42,10 +42,10 @@ SEARCH=""
LANG=C LANG=C
## If files.csv is in the searchsploit path, use that instead ## If we cannot find files.csv in ${gitpath}
if [[ -f "$( dirname "$0" )/files.csv" ]]; then if [[ ! -f "${csvpath}" ]]; then
gitpath="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" echo '[!] Could not find: ' ${csvpath}
csvpath="${gitpath}/files.csv" exit 1
fi fi