SearchSploit

Command line of Exploit DB. Offline. The Exploit Database is maintained by Offensive Security.

The Exploit DB website has an Advanced Search feature with the No Metasploit option useful for the OSCP exam.

Help

searchsploit -h
-c, --case     [Term]      Perform a case-sensitive search (Default is inSEnsITiVe).
-e, --exact    [Term]      Perform an EXACT match on exploit title (Default is AND) [Implies "-t"].
-h, --help                 Show this help screen.
-j, --json     [Term]      Show result in JSON format.
-m, --mirror   [EDB-ID]    Mirror (aka copies) an exploit to the current working directory.
-o, --overflow [Term]      Exploit titles are allowed to overflow their columns.
-p, --path     [EDB-ID]    Show the full path to an exploit (and also copies the path to the clipboard if possible).
-t, --title    [Term]      Search JUST the exploit title (Default is title AND the file's path).
-u, --update               Check for and install any exploitdb package updates (deb or git).
-w, --www      [Term]      Show URLs to Exploit-DB.com rather than the local path.
-x, --examine  [EDB-ID]    Examine (aka opens) the exploit using $PAGER.
    --colour               Disable colour highlighting in search results.
    --id                   Display the EDB-ID value rather than local path.
    --nmap     [file.xml]  Checks all results in Nmap's XML output with service version (e.g.: nmap -sV -oX file.xml).
                             Use "-v" (verbose) to try even more combinations
    --exclude="term"       Remove values from results. By using "|" to separated you can chain multiple values.
                                e.g. --exclude="term1|term2|term3".

Update the exploit database

searchsploit -u

Exploits location

ls -la /usr/share/exploitdb/exploits

Search for exploits

Search exploits for OpenSSH v6.6

searchsploit OpenSSH 6.6

Examples from help

searchsploit afd windows local
searchsploit -t oracle windows
searchsploit -p 39446
searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"
searchsploit -s Apache Struts 2.0.0
searchsploit linux reverse password
searchsploit -j 55555 | json_pp

Search SMB exploits on Windows, exclude DoS

searchsploit smb microsoft --exclude=dos

Search only in exploit title

searchsploit -t drupalgeddon user
searchsploit -t priv escalation

Search for a specific CVE

New in Nov 2022

searchsploit --cve 2021-44228

Exploits already in Metasploit

searchsploit drupalgeddon | grep Metasploit

Exploits NOT in Metasploit

searchsploit drupalgeddon --exclude="Metasploit"
searchsploit drupalgeddon | grep -v Metasploit

Exclude unwanted results

searchsploit drupalgeddon --exclude="(PoC)|Authenticated"
searchsploit drupalgeddon | grep -v 'Authenticated'

Examine exploit

searchsploit -x 34992

Copy (“mirrors”) exploit in current directory

searchsploit -m 34992

Automated search for nmap results

IP=x.x.x.x
nmap -T4 -sV --top-ports 1000 $IP -oX file.xml
searchsploit --nmap file.xml

Other examples

searchsploit afd windows local
searchsploit -p 34992