LinuxCommandLibrary

searchsploit

Search Exploit Database archive locally

TLDR

Search for exploits by keywords

$ searchsploit [apache] [struts]
copy
Search in titles only
$ searchsploit -t [oracle] [windows]
copy
Perform exact match search
$ searchsploit -e "[Microsoft IIS 6.0]"
copy
Search by CVE ID
$ searchsploit --cve [2021-44228]
copy
Copy exploit to current directory
$ searchsploit -m [39446]
copy
Examine/display exploit content
$ searchsploit -x [39446]
copy
Output results as JSON
$ searchsploit -j [linux kernel] [3.2]
copy
Exclude terms from results
$ searchsploit [linux kernel] --exclude="(PoC)|/dos/"
copy
Update the database
$ searchsploit -u
copy

SYNOPSIS

searchsploit [options] term1 [term2...] [termN]
searchsploit --cve CVE-ID
searchsploit -m EDB-ID

DESCRIPTION

searchsploit is a command-line tool for searching the Exploit Database (exploit-db.com) archive locally. It provides offline access to thousands of public exploits, shellcodes, papers, and vulnerability information maintained by Offensive Security.
The tool searches both exploit titles and file paths by default. Multiple search terms are combined with AND logic—all terms must match. Use quotes for exact phrases and exclude patterns with --exclude. Results show the exploit title and local path.
Once an exploit is found, use -m to copy it to your current directory or -x to view its content. The --cve option searches by CVE identifier for known vulnerabilities. The database requires periodic updates with -u.

PARAMETERS

-c, --case

Case-sensitive search
-e, --exact
Exact match search
-s, --strict
Strict search; disable fuzzy version matching
-t, --title
Search exploit titles only (default: title and path)
--exclude TERM
Exclude results containing term
-p, --path
Show full path to exploit file
-m, --mirror ID
Copy exploit to current directory
-x, --examine ID
Display exploit content
-j, --json
Output in JSON format
-w
Show exploit-db.com URLs
--cve ID
Search by CVE identifier
--id ID
Search by Exploit-DB ID
-u, --update
Update local database
-h, --help
Display help

CAVEATS

Exploits are provided for authorized security testing only. Many exploits require modification for specific targets. Code should be reviewed and understood before use. Some exploits may be outdated or non-functional. The local database must be updated regularly to include recent exploits.

HISTORY

SearchSploit is part of the Exploit Database project maintained by Offensive Security, the creators of Kali Linux. The Exploit Database was launched in 2004 as a public archive of exploits for penetration testers and security researchers. SearchSploit provides offline access to this database, essential for testing in air-gapped environments. The database includes exploits from various sources and continues to grow with community contributions.

SEE ALSO

msfconsole(1), nmap(1), nikto(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community