Exploitdb

Shell-style script to search exploit-db.com exploits.


Project maintained by mattoufoutu Hosted on GitHub Pages — Theme by mattgraham

Introduction

There is already a similar script shipped with the Kali distribution, but I think it's not flexible enough. This script is an attempt at providing a more flexible tool, with a fancy shell-style interface.

Features

Usage

Just run the exploitdb.py script without any argument, you will be given a pseudo-shell interface.

If running for the first time, the script will automatically download the latest exploits archive at startup.

Searching exploits

The search command allows you to search for a given pattern in any field of the original exploit-db's CSV file. The search query must be in the form of field_name:pattern couples, if no field name is given, description is the default.

Available fields are:

If the pattern you want to search contains spaces, you can quote it using either single or double quotes (see screenshot below).

Getting exploit infos

To show all the available details about an exploit, use the info command. This command takes a single argument, which is the ID of the exploit you want details for.

Updating database

Running the updatedb command will download the latest exploits archive from exploit-db.com and extract it in an exploits folder in current directory.

Screenshots

search

search1

search2

info

info

updatedb

updatedb

Licensing

This script is under the FreeBSD (2-clause BSD) License.