ExploitDB
Searchable archive from The Exploit Database for locating exploits. Provides command-line tool searchsploit to query local exploit database.
Description
ExploitDB is a searchable exploit database archive hosted at /usr/share/exploitdb containing exploits and shellcodes. It enables users to search for exploits by keywords, platforms, and types using the searchsploit command-line tool. The database is sourced from https://www.exploit-db.com/ and installed size is 190.28 MB.
Common use cases include penetration testing for locating public exploits matching discovered vulnerabilities, such as remote exploits for specific software like Oracle on Windows. It supports filtering searches by title, path exclusion, exact matches, and version ranges to reduce false positives.
The tool integrates with Nmap XML output for automated exploit matching against scanned service versions. Updates are available via package managers.
How It Works
Searchsploit indexes the local /usr/share/exploitdb/exploits and shellcodes directories. Searches perform case-insensitive AND matches across exploit titles and file paths by default, with fuzzy version range detection. Options enable exact title matches, path exclusion, case-sensitive searches, and strict version matching. Results display EDB-ID, description, and paths; non-search functions mirror or examine specific exploits by ID.
Installation
sudo apt install exploitdbFlags
Examples
searchsploit oracle windows remotesearchsploit afd windows localsearchsploit -t oracle windowssearchsploit -p 39446searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"searchsploit -s Apache Struts 2.0.0searchsploit linux reverse passwordsearchsploit -j 55555 | jq