Skip to content
This repository was archived by the owner on Nov 28, 2022. It is now read-only.

Commit dd9192c

Browse files
committed
Merge pull request #5 from offensive-security/master
merge from offensive-security/exploit-database
2 parents 8997d65 + 756da2b commit dd9192c

3,952 files changed

Lines changed: 68627 additions & 19444 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

README.md

Lines changed: 34 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,41 +1,52 @@
11
The Exploit-Database Git Repository
22
===================================
33

4-
This is the official repository of [The Exploit Database](http://www.exploit-db.com), a project sponsored by [Offensive Security](https://www.offensive-security.com).
4+
This is the official repository of [The Exploit Database](http://www.exploit-db.com/), a project sponsored by [Offensive Security](https://www.offensive-security.com/).
55

66
The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.
77

8-
This repository is updated daily with the most recently added submissions.
8+
This repository is updated daily with the most recently added submissions. Any additional resources can be found in our [binary sploits repository](https://github.com/offensive-security/exploit-database-bin-sploits).
99

1010
Included with this repository is the **searchsploit** utility, which will allow you to search through the exploits using one or more terms.
1111

1212
```
1313
root@kali:~# searchsploit -h
14-
Usage : searchsploit [OPTIONS] term1 [term2] ... [termN]
15-
Example: searchsploit oracle windows local
14+
Usage: searchsploit [OPTIONS] term1 [term2] ... [termN]
15+
Example:
16+
searchsploit afd windows local
17+
searchsploit -t oracle windows
1618
1719
=========
18-
OPTIONS
20+
Options
1921
=========
20-
-c - Perform case-sensitive searches; by default,
21-
searches will try to be greedy
22-
-v - By setting verbose output, description lines
23-
are allowed to overflow their columns
24-
-h, --help - Show help screen
25-
26-
NOTES:
27-
- Use any number of search terms you would like (minimum: 1)
28-
- Search terms are not case sensitive, and order is irrelevant
22+
-c, --case Perform a case-sensitive search (Default is insensitive).
23+
-h, --help Show this help screen.
24+
-t, --title Search just the exploit title (Default is title AND the file's path).
25+
-u, --update Update exploit database from git.
26+
-v, --verbose Verbose output. Title lines are allowed to overflow their columns.
27+
-w, --www Show URLs to Exploit-DB.com rather than local path.
28+
--colour Disable colour highlighting.
29+
--id Display EDB-ID value rather than local path.
30+
31+
=======
32+
Notes
33+
=======
34+
* Use any number of search terms, in any order.
35+
* Search terms are not case sensitive, and order is irrelevant.
36+
* Use '-c' if you wish to reduce results by case-sensitive searching.
37+
* Use '-t' to exclude the file's path to filter the search results.
38+
* Could possibly remove false positives (especially when searching numbers).
39+
* When updating from git or displaying help, search terms will be ignored.
2940
3041
root@kali:~# searchsploit afd windows local
31-
----------------------------------------------------------------|----------------------------------
32-
Description | Path
33-
----------------------------------------------------------------|----------------------------------
34-
MS Windows XP/2003 AFD.sys Privilege Escalation Exploit (K-plug | /windows/local/6757.txt
35-
Microsoft Windows xp AFD.sys Local Kernel DoS Exploit | /windows/dos/17133.c
36-
Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit (M | /windows/local/18176.py
37-
Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | /windows/local/21844.rb
38-
----------------------------------------------------------------|----------------------------------
42+
------------------------------------------------------------ ----------------------------------
43+
Exploit Title | Path
44+
| (/usr/share/exploitdb/platforms)
45+
------------------------------------------------------------ ----------------------------------
46+
MS Windows XP/2003 - AFD.sys Privilege Escalation Exploit (K| /windows/local/6757.txt
47+
Microsoft Windows XP - AFD.sys Local Kernel DoS Exploit | /windows/dos/17133.c
48+
Windows XP/2003 Afd.sys - Local Privilege Escalation Exploit| /windows/local/18176.py
49+
Windows - AfdJoinLeaf Privilege Escalation (MS11-080) | /windows/local/21844.rb
50+
------------------------------------------------------------ ----------------------------------
3951
root@kali:~#
4052
```
41-

0 commit comments

Comments
 (0)