diff --git a/generic-methodologies-and-resources/search-exploits.md b/generic-methodologies-and-resources/search-exploits.md
index bcb1ae203..374f22999 100644
--- a/generic-methodologies-and-resources/search-exploits.md
+++ b/generic-methodologies-and-resources/search-exploits.md
@@ -1,4 +1,4 @@
-
+# Search Exploits
@@ -16,14 +16,13 @@ Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
-
-## Browser
+### Browser
Always search in "google" or others: **\ \[version] exploit**
You should also try the **shodan** **exploit search** from [https://exploits.shodan.io/](https://exploits.shodan.io).
-## Searchsploit
+### Searchsploit
Useful to search exploits for services in **exploitdb from the console.**
@@ -37,25 +36,28 @@ searchsploit -x 7618[.c] #Open vi to inspect the exploit
searchsploit --nmap file.xml #Search vulns inside an nmap xml result
```
-## MSF-Search
+### Pompem
+
+[https://github.com/rfunix/Pompem](https://github.com/rfunix/Pompem) is another tool to search for exploits
+
+### MSF-Search
```bash
msf> search platform:windows port:135 target:XP type:exploit
```
-## PacketStorm
+### PacketStorm
If nothing is found, try to search the used technology inside [https://packetstormsecurity.com/](https://packetstormsecurity.com)
-## Vulners
+### Vulners
You can also search in vulners database: [https://vulners.com/](https://vulners.com)
-## Sploitus
+### Sploitus
This search exploits in other databases: [https://sploitus.com/](https://sploitus.com)
-
Support HackTricks and get benefits!
@@ -71,5 +73,3 @@ Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
**Share your hacking tricks submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
-
-