Search services vulnerabilities
searchsploit --exclude=dos -t apache 2.2.3
msfconsole; > search apache 2.2.3
https://cve.mitre.org/cve/search_cve_list.html
National Vulnerability Database (NVD)
U.S. Government Repository of standards based vulnerability management data represented using the Security Content Automation Protocol.
https://mvd.mist.gov/
https://nvd.nist.gov/general/visualizations
To show a visualization of CVSS’s Severity over time.
https://nvd.nist.gov/vuln/data-feeds
https://www.cvedetails.com
Search by CVE and OSVDB identifier.
https://www.exploit-db.com
Searchsploit by Exploit-db
Offline source for finding vulnerabilities and exploits.
To update the database:
searchsploit -u
searchsploit
searchsploit [key word or service/service version]
Copy a searchsploit result to your present working directory
searchsploit -m 39446 win_x86-64/local/39525.py
locate 35513.py
cp /usr/share/exploitdb/platforms/linux/remote/35513.py /root/Desktop/35513.py
Exclude certain results like DOS or POC
searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"
Can print the file for an exploit
cat /usr/share/exploitdb/exploits/linux/remote/16922.rb
Exact match to your keyword input
Always start with specific and move to more general
Python #!/usr/bin/python
Bash #!/bin/bash
Bourne shell #!/bin/sh
Perl #!/usr/bin/perl