A command-line script to provide fine grain search queries to specific fields in the exploit-database.
##Description
An alternative to the original searchsploit script that provides a finer level of control as well as verbose output for help find
where your searches are going wrong. The search logic searches by author => date => platform => type => port => description. Searchsploit2 also supports updating your local exploit-database CSV copy and mimicks the output format of the original searchsploit script.
searchsploit2 [-h] [--file PATH] [--author AUTHOR] [--date YYYY-MM-DD]
[--platform PLATFORM] [--type TYPE] [--port PORT] [--description TERM]
[--update] [--verbose] [--version]
--file/-f PATHPath to exploit-db CSV file.--author/-a AUTHORSearch for exploit author's name.--date/-d YYYY-MM-DDSearch for exploits published on YYYY-MM-DD.--platform/-o PLATFORMSearch exploits by platform / OS.--type/-t TYPESearch by exploit type.--port/-p PORTSearch exploits by affected port number.--description/-d TERMSearch exploit description for term.--update/-uUpdate local copy of exploit-db and exit.--verbose/-vEnable verbose output to track troublesome queries.--versionShow program's version number and exit.
##Examples
python3 searchsploit2.py --platform windows --type remote --description MS08-067
python3 searchsploit2.py -v -o plan9 -t remote
python3 searchsploit2.py --date 2014-01-01 -p 80
python3 searchsploit2.py --author TurboBorland --file ~/.searchsploit2/files.csv
Currently the search functionality does not accept regular expressions such as " * ", this feature may be implemented in the future. Please report any additional issues found to https://github.com/Spacecow99/searchsploit/issues.