searchsploit
Search through exploits and shellcodes
Details
Category: Vulnerabilities
Publisher: trickest-mhmdiaa
Created Date: 11/23/2023
Container: quay.io/trickest/searchsploit:d66aada8-patch-1
Source URL: https://gitlab.com/exploit-database/exploitdb
Parameters
id
boolean
Command:
--id
- Display the EDB-ID value rather than local pathcve
boolean
Command:
--cve
- Search for Common Vulnerabilities and Exposures (CVE) valuewww
boolean
Command:
--www
- Show URLs to Exploit-DB.com rather than the local pathcase
boolean
Command:
--case
- Perform a case-sensitive search (Default is inSEnsITiVe)json
boolean
Command:
--json
- Show result in JSON formatnmap
file
Command:
--nmap
- Checks all results in Nmap's XML output with service versionpath
boolean
Command:
--path
- Show the full path to an exploit (and also copies the path to the clipboard if possible)term
string
requiredCommand:
- Search termexact
boolean
Command:
--exact
- Perform an EXACT & order match on exploit title (Default is an AND match on each term) [Implies --title] (e.g. WordPress 4.1 would not be detect WordPress Core 4.1)title
boolean
Command:
--title
- Search JUST the exploit title (Default is title AND the file's path)strict
boolean
Command:
--strict
- Perform a strict search, so input values must exist, disabling fuzzy search for version range (e.g. 1.1 would not be detected in 1.0 < 1.3)exclude
string
Command:
--exclude
- Remove values from results. By using | to separate, you can chain multiple values (e.g. term1|term2|term3)verbose
boolean
Command:
--verbose
- Display more information in outputoverflow
boolean
Command:
--overflow
- Exploit titles are allowed to overflow their columnsdisable-colour
boolean
Command:
--disable-colour
- Disable colour highlighting in search results