Exploit Database Archive Search


searchsploit [options] term1 [term2] ... [termN]


Allow you to search through exploits and shellcodes using one or more terms from Exploit-DB


-c, --case [Term] Perform a case-sensitive search (Default is inSEnsITiVe). -e, --exact [Term] Perform an EXACT match on exploit title (Default is AND) [Implies "-t"]. -h, --help Show this help screen. -j, --json [Term] Show result in JSON format. -m, --mirror [EDB-ID] Mirror (aka copies) an exploit to the current working directory. -o, --overflow [Term] Exploit titles are allowed to overflow their columns. -p, --path [EDB-ID] Show the full path to an exploit (and also copies the path to the clipboard if possible). -t, --title [Term] Search JUST the exploit title (Default is title AND the file's path). -u, --update Check for and install any exploitdb pack‐ age updates (deb or git). -w, --www [Term] Show URLs to rather than the local path. -x, --examine [EDB-ID] Examine (aka opens) the exploit using $PAGER. --colour Disable colour highlighting in search re‐ sults. --id Display the EDB-ID value rather than lo‐ cal path. --nmap [file.xml] Checks all results in Nmap's XML output with service version (e.g.: nmap -sV -oX file.xml). Use "-v" (verbose) to try even more combinations --exclude="term" Remove values from results. By using "|" to separated you can chain multiple values. e.g. --exclude="term1|term2|term3".


searchsploit afd windows local searchsploit -t oracle windows searchsploit -p 39446 searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"


As this is bash script, should be available on most *nix systems.


No bugs have been reported for this version. Any bugs should be re‐ ported to Exploit-DB's GitHub repo (‐ rity/exploit-database).

NOTES Exploit Database Homepage SearchSploit manual


Distributed under GNU General Public License v2.0 (‐


Offensive Security ( Unix-Ninja g0tmi1k (

Copied to clipboard