diff --git a/generic-methodologies-and-resources/search-exploits.md b/generic-methodologies-and-resources/search-exploits.md index bcb1ae203..374f22999 100644 --- a/generic-methodologies-and-resources/search-exploits.md +++ b/generic-methodologies-and-resources/search-exploits.md @@ -1,4 +1,4 @@ - +# Search Exploits
@@ -16,14 +16,13 @@ Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
- -## Browser +### Browser Always search in "google" or others: **\ \[version] exploit** You should also try the **shodan** **exploit search** from [https://exploits.shodan.io/](https://exploits.shodan.io). -## Searchsploit +### Searchsploit Useful to search exploits for services in **exploitdb from the console.** @@ -37,25 +36,28 @@ searchsploit -x 7618[.c] #Open vi to inspect the exploit searchsploit --nmap file.xml #Search vulns inside an nmap xml result ``` -## MSF-Search +### Pompem + +[https://github.com/rfunix/Pompem](https://github.com/rfunix/Pompem) is another tool to search for exploits + +### MSF-Search ```bash msf> search platform:windows port:135 target:XP type:exploit ``` -## PacketStorm +### PacketStorm If nothing is found, try to search the used technology inside [https://packetstormsecurity.com/](https://packetstormsecurity.com) -## Vulners +### Vulners You can also search in vulners database: [https://vulners.com/](https://vulners.com) -## Sploitus +### Sploitus This search exploits in other databases: [https://sploitus.com/](https://sploitus.com) -
Support HackTricks and get benefits! @@ -71,5 +73,3 @@ Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) **Share your hacking tricks submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
- -