Exploit-DB is one of the most popular platforms for collecting exploits and whitepapers related to Linux / Windows / Assembly / Web / DOS etc.
Exploit-DB is the ultimate archive for exploits, shells and security whitepapers. You can easily find the most recently exploits related to Remote exploits, Web Application exploits, Local and Privilege Escalation exploits, Denial of Service exploits but also shellcode exploits.
Now, to easily and quickly find the exploits we are interested in, there is one script written in python, where you call Searchsploit.
To install searchsploit, you can through the git clone where it clones searchsploit directly to Kali Linux OS from Github repository
git clone https://github.com/offensive-security/exploit-database.git
For information, you can just use the order git pull
If you are using the standard version of GNOME on Kali Linux, the "exploitdb" package is already included by default!
Mandate: apt update && apt -y install exploitdb
If you are not using Kali Linux, the exploitdb package may not be available through the package manager, so you can install it using the git command above.
Searchsploit is a tool that does not require an internet connection, and will help you search for all kinds of exploits available offline.
Using Help, you can easily see all the features and options at your disposal:
Usage: To search for exploits for Linux Kernel 3.2, you can simply enter the following command:
Mandate: searchsploit linux kernel 3.2
It will display all the exploits related to the Linux Kernel, along with the path of each exploit where it is stored.
For Apache 2.x-related exploits, you can simply type “searchsploit Apache 2.x"
If you want to see the URL of each exploit, then you can include the (-w) attribute:
Mandate: searchsploit -w apache 2.x
You can also include the (-p) option to see the full path of exploit.
In the search with the option (-t), the exploits that match the title will appear.
To update searchsploit, you can simply type “searchsploit -u"
If you need all the results in JSON format, then just add the (-j) attribute:
For more information about Searchsploit, visit the link https://www.exploit-db.com/searchsploit/