1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-04-29 23:24:55 +02:00
tldr/pages/common/searchsploit.md
Fazle Arefin d44bb05ba2
searchsploit: edit page (#12310)
* searchsploit: edit page

* searchsploit: add examples

* searchsploit: improve page description

* searchexploit: add missing mnemonics and rephrase descriptions

* Update pages/common/searchsploit.md

Co-authored-by: Vitor Henrique <87824454+vitorhcl@users.noreply.github.com>

* Update pages/common/searchsploit.md

Co-authored-by: Vitor Henrique <87824454+vitorhcl@users.noreply.github.com>

* Update pages/common/searchsploit.md

Co-authored-by: Vitor Henrique <87824454+vitorhcl@users.noreply.github.com>

* Update pages/common/searchsploit.md

Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>

* Update pages/common/searchsploit.md

Co-authored-by: Vitor Henrique <87824454+vitorhcl@users.noreply.github.com>

* Update pages/common/searchsploit.md

Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>

* Update pages/common/searchsploit.md

Co-authored-by: Sebastiaan Speck <12570668+sebastiaanspeck@users.noreply.github.com>

---------

Co-authored-by: Vitor Henrique <87824454+vitorhcl@users.noreply.github.com>
Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>
Co-authored-by: Sebastiaan Speck <12570668+sebastiaanspeck@users.noreply.github.com>
2024-02-22 01:05:05 +11:00

37 lines
1.2 KiB
Markdown

# searchsploit
> Search Exploit Database for exploits, shellcodes and/or papers.
> If known version numbers are used as search terms, exploits for both the exact version and others whose version range covers the one specified are shown.
> More information: <https://www.exploit-db.com/searchsploit>.
- Search for an exploit, shellcode, or paper:
`searchsploit {{search_terms}}`
- Search for a known specific version, e.g. sudo version 1.8.27:
`searchsploit sudo 1.8.27`
- Show the exploit-db link to the found resources:
`searchsploit --www {{search_terms}}`
- Copy ([m]irror) the resource to the current directory (requires the number of the exploit):
`searchsploit --mirror {{exploit_number}}`
- E[x]amine the resource, using the pager defined in the `$PAGER` environment variable:
`searchsploit --examine {{exploit_number}}`
- [u]pdate the local Exploit Database:
`searchsploit --update`
- Search for the [c]ommon [v]ulnerabilities and [e]xposures (CVE) value:
`searchsploit --cve {{2021-44228}}`
- Check results in `nmap`'s XML output with service version (`nmap -sV -oX nmap-output.xml`) for known exploits:
`searchsploit --nmap {{path/to/nmap-output.xml}}`