searchsploit
Search through exploits and shellcodes
Name:searchsploit
Category:Vulnerabilities
Publisher:trickest-mhmdiaa
Created:11/23/2023
Container:
quay.io/trickest/searchsploit:d66aada8-patch-1
Output Type:
License:Unknown
Source:View Source
Parameters
--id
Display the EDB-ID value rather than local path--cve
Search for Common Vulnerabilities and Exposures (CVE) value--www
Show URLs to Exploit-DB.com rather than the local path--case
Perform a case-sensitive search (Default is inSEnsITiVe)--json
Show result in JSON format--nmap
Checks all results in Nmap's XML output with service version--path
Show the full path to an exploit (and also copies the path to the clipboard if possible)
Search term--exact
Perform an EXACT & order match on exploit title (Default is an AND match on each term) [Implies --title] (e.g. WordPress 4.1 would not be detect WordPress Core 4.1)--title
Search JUST the exploit title (Default is title AND the file's path)--strict
Perform a strict search, so input values must exist, disabling fuzzy search for version range (e.g. 1.1 would not be detected in 1.0 < 1.3)--exclude
Remove values from results. By using | to separate, you can chain multiple values (e.g. term1|term2|term3)--verbose
Display more information in output--overflow
Exploit titles are allowed to overflow their columns--disable-colour
Disable colour highlighting in search results