Command-line search tool for Exploit-DB that allows you to take a copy of the Exploit Database with you.

Simple Search

searchsploit openssh
searchsploit openssh 7.2

# Try to use more than one positional parameters or more than one arguments.
searchsploit cups linux local

Title Searching

Searches can be restricted to the titles by using the -t option

searcsploit -t php linux

Removing Unwanted Results

searchsploit linux kernel 3.5 --exclude="PoC"

# Alternative Method of Removing Unwanted Results
searchsploit rlogin | grep -v '/poc/'

Copy The Path To Clipboard

searchsploit -p 9542

Copy To Folder

Do not alter the exploits in your local copy of the database. Instead, make a copy of ones that are of interest and use them from a working directory.

searchsploit -m MS17-010 exploits/windows/remote/42031.py

Exploit-DB Online

searchsploit vsftpd 2.3.4 -w

Examining Nmap Results

searchsploit -x --nmap output.xml

# Nmap has a feature that let you save its output result in .xml format and we can identify each exploit associated with the Nmap XML file.
nmap -Pn -n IP -oX output.xml

# With the help of above command, we have saved the scanning result of Nmap in an XML file, so that we can search the exploit related to scanned port/services.
searchsploit -x --nmap output.xml

Examine an Exploit

searchsploit 9542 --examine