A mirror of the Gitlab repo: https://gitlab.com/exploit-database/exploitdb
Find a file
g0tmi1k 85361a1879 SearchSploit - Code clean up & new features
+ Header will display full path (e.g. `/usr/share/exploitdb/platforms`)
+ Add 'Web Link' (`-w`) to show URLs
+ Add 'EDB-ID' (`--id`) to show only EDB-ID values
+ Add colour mode - will highlight results by default (`--colour` to disable it)
+ Better performance (Less pipes - but more awks. _So theres still work_).
+ Search results are more accurate (doesn't search path - only exploit title)
2015-06-11 14:16:29 +01:00
platforms DB: 2015-06-11 2015-06-11 05:02:28 +00:00
files.csv DB: 2015-06-11 2015-06-11 05:02:28 +00:00
README.md Update README.md 2014-12-10 12:10:34 -07:00
searchsploit SearchSploit - Code clean up & new features 2015-06-11 14:16:29 +01:00

The Exploit-Database Git Repository

This is the official repository of The Exploit Database, a project sponsored by Offensive Security.

The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.

This repository is updated daily with the most recently added submissions.

Included with this repository is the searchsploit utility, which will allow you to search through the exploits using one or more terms.

root@kali:~# searchsploit -h
Usage  : searchsploit [OPTIONS] term1 [term2] ... [termN]
Example: searchsploit oracle windows local

=========
 OPTIONS
=========
 -c         - Perform case-sensitive searches; by default,
              searches will try to be greedy
 -v         - By setting verbose output, description lines
              are allowed to overflow their columns
 -h, --help - Show help screen

NOTES:
 - Use any number of search terms you would like (minimum: 1)
 - Search terms are not case sensitive, and order is irrelevant

root@kali:~# searchsploit afd windows local
----------------------------------------------------------------|----------------------------------
Description                                                     |  Path
----------------------------------------------------------------|----------------------------------
MS Windows XP/2003 AFD.sys Privilege Escalation Exploit (K-plug | /windows/local/6757.txt
Microsoft Windows xp AFD.sys Local Kernel DoS Exploit           | /windows/dos/17133.c
Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (M | /windows/local/18176.py
Windows - AfdJoinLeaf Privilege Escalation (MS11-080)           | /windows/local/21844.rb
----------------------------------------------------------------|----------------------------------
root@kali:~#