Command-line search tool for Exploit-DB that allows you to take a copy of the Exploit Database with you.
searchsploit openssh
searchsploit openssh 7.2
# Try to use more than one positional parameters or more than one arguments.
searchsploit cups linux local
Searches can be restricted to the titles by using the -t option
searcsploit -t php linux
searchsploit linux kernel 3.5 --exclude="PoC"
# Alternative Method of Removing Unwanted Results
searchsploit rlogin | grep -v '/poc/'
searchsploit -p 9542
Do not alter the exploits in your local copy of the database. Instead, make a copy of ones that are of interest and use them from a working directory.
searchsploit -m MS17-010 exploits/windows/remote/42031.py
searchsploit vsftpd 2.3.4 -w
searchsploit -x --nmap output.xml
# Nmap has a feature that let you save its output result in .xml format and we can identify each exploit associated with the Nmap XML file.
nmap -Pn -n IP -oX output.xml
# With the help of above command, we have saved the scanning result of Nmap in an XML file, so that we can search the exploit related to scanned port/services.
searchsploit -x --nmap output.xml
searchsploit 9542 --examine