Exploit-DB is one of the most popular platforms for collecting exploits and whitepapers related to Linux / Windows / Assembly / Web / DOS etc.
Exploit-DB is the ultimate file for exploits, shells and security whitepapers. You can easily find the latest exploits related to Remote exploits, Web Application exploits, Local and Privilege Escalation exploits, Denial of Service exploits and shellcode exploits.
Now, to easily and quickly find the exploits we are interested in, there is a script written in python, where you call it Searchsploit.
To install searchsploit you can via git clone where it directly clones searchsploit on Kali Linux OS from Github Repository
git clone https://github.com/offensive-security/exploit-database.git
For information, you can simply use the order git pull
If you use the standard version of GNOME on Kali Linux, the “exploitdb” package is already included by default!
Mandate: apt update && apt -y install exploitdb
If you are not using Kali Linux, the exploitdb package may not be available through the package manager, so you can install it using the git command above.
Searchsploit is one tool which does not need a connection to Internet, and will help you search for all kinds of exploits available offline.
Using Help, you can easily see all the features and options at your disposal:
Usage: To search for exploits for Linux Kernel 3.2, you can simply enter the following command:
Mandate: searchsploit linux kernel 3.2
It will display all the exploits related to the Linux Kernel, along with the path of each exploit where it is stored.
For Apache 2.x-related exploits, you can simply type “searchsploit Apache 2.x"
If you want to see the URL of each exploit, then you can include the (-w) attribute:
Mandate: searchsploit -w apache 2.x
You can also include the (-p) option to see the full path of exploit.
In the search with the option (-t), the exploits that match the title will appear.
To update searchsploit, you can simply type “searchsploit -u"
If you need all the results in JSON format, then just add the (-j) attribute:
For more information about Searchsploit, visit the link https://www.exploit-db.com/searchsploit/