Sodamhan.com

TL;DR

searchsploit

Search Exploit Database for exploits, shellcodes and/or papers. If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown. More information: https://www.exploit-db.com/searchsploit.

  • Search for an exploit, shellcode, or paper:

searchsploit search_terms

  • Search for a known specific version, e.g. sudo version 1.8.27:

searchsploit sudo 1.8.27

  • Show the exploit-db link to the found resources:

searchsploit --www search_terms

  • Copy (mirror) the resource to the current directory (requires the number of the exploit):

searchsploit --mirror exploit_number

  • E[x]amine the resource, using the pager defined in the $PAGER environment variable:

searchsploit --examine exploit_number

  • update the local Exploit Database:

searchsploit --update

  • Search for the common vulnerabilities and exposures (CVE) value:

searchsploit --cve 2021-44228

  • Check results in nmap’s XML output with service version (nmap -sV -oX nmap-output.xml) for known exploits:

searchsploit --nmap path/to/nmap-output.xml

This document was created using the contents of the tldr project.