dear maintainers,
i reviewed the code of this script and i discovered that git clone works by cloning the current state of the repository and also all the history. i think that someone using searchsploit -u will not use the history, but only the current state.
so i propose you to use the option "--depth=1", which allows the clone of only the current state of the db.
if you think this is a bad idea for any reason, feel free to drop this request (if so, could you please let me know why? just because i am curious :D ).
thanks a lot for providing exploit-db, i really appreciate the effort and the project itself!
happy hacking!
Lo
This is how the old method of search was working.
**Still uses `fgrep` rather than `grep -f`**.
- - -
## Before
```
root@kali:~/exploit-database# ./searchsploit afd windows local
---------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------
Exploit Title | Path
| (/usr/share/exploitdb/platforms)
---------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------
Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | ./windows/dos/17133.c
Microsoft Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (MS11-080) | ./windows/local/18176.py
---------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------
root@kali:~/exploit-database#
```
## Now / Old method
```
root@kali:~/exploit-database# ./searchsploit afd windows local -f
---------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------
Exploit Title | Path
| (/usr/share/exploitdb/platforms)
---------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------
Microsoft Windows 2003/XP - AFD.sys Privilege Escalation Exploit (K-plugin) | ./windows/local/6757.txt
Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | ./windows/dos/17133.c
Microsoft Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (MS11-080) | ./windows/local/18176.py
Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | ./windows/local/21844.rb
---------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------
root@kali:~/exploit-database#
```
+ Header will display full path (e.g. `/usr/share/exploitdb/platforms`)
+ Add 'Web Link' (`-w`) to show URLs
+ Add 'EDB-ID' (`--id`) to show only EDB-ID values
+ Add colour mode - will highlight results by default (`--colour` to disable it)
+ Better performance (Less pipes - but more awks. _So theres still work_).
+ Search results are more accurate (doesn't search path - only exploit title)