Ultimate Searchsploit Cheat Sheet




Ultimate Searchsploit Cheat Sheet

The CLI tool for Exploit-DB. Find exploits offline, fast.

1. Search Modes

Refining how Searchsploit queries the local CSV database.

Standard Search

Case-insensitive search for terms.

searchsploit wordpress plugin

Exact Title Match (-t)

Searches strictly within the "Title" field (ignores path/author). Reduces false positives.

searchsploit -t "windows 10"

Strict Search (-s)

Performs a specific search (case sensitive options available).

searchsploit -s "Apache 2.4"

By CVE ID

Find exploits related to a specific CVE.

searchsploit --cve 2021-44228

2. Result Handling & Copying

Once you find an exploit, you need to move it to your working directory.

Mirror (Copy) to Current Folder (-m)

Copies the exploit file (and any dependencies) to your current location.

searchsploit -m 42315

Show Full Path (-p)

Displays the absolute path to the exploit on your disk.

searchsploit -p 42315

Copy Path to Clipboard (Pipe)

Quickly copy the path for use in other commands.

searchsploit -p 42315 | grep "Path" | cut -d ":" -f 2 | xclip -sel clip

3. Exploit Inspection

Always read the code before running it!

Examine Exploit (-x)

Opens the exploit in your default editor ($PAGER or vim). Good for checking hardcoded IP addresses or shellcode payload size.

searchsploit -x 42315

Filtering Noise

Exclude results that are just "Denial of Service" (DoS) scripts using grep-like exclusions.

searchsploit apache --exclude="DoS"

4. Online Interaction

Sometimes local scripts are broken or missing binary files.

Get Web Link (-w)

Returns the URL to the exploit on exploit-db.com.

searchsploit -w 42315

Result: https://www.exploit-db.com/exploits/42315

5. Automation & Piping

Power user features for scripting and tool integration.

Nmap XML Input

Search automatically based on Nmap scan results.

searchsploit --nmap target_scan.xml

JSON Output (-j)

Export results to JSON for parsing with tools like jq.

searchsploit "sudo" -j > sudo_exploits.json

Color Disable

If you are piping output to a file, disable colors to avoid ANSI code garbage.

searchsploit --no-color wordpress > results.txt

6. Maintenance

Update Database

Exploit-DB is updated daily. Keep your local copy fresh.

searchsploit -u
Note: If installed via Kali packages, use apt update && apt install exploitdb instead.