exploit-db
Installation
SKILL.md
searchsploit Usage Patterns
# Text search in title/path
searchsploit apache 2.4
# Search by CVE
searchsploit --cve CVE-2021-41773
searchsploit --cve CVE-2021-44228
# JSON output for scripting
searchsploit apache --json | python3 -c "
import sys, json
data = json.load(sys.stdin)
for e in data.get('RESULTS_EXPLOIT', []):
print(e['EDB-ID'], e['Title'], e['Path'])
"
# Copy exploit to working dir
Related skills
More from mukul975/threatswarm
ad-attacks
Active Directory attack reference — BloodHound Cypher queries, Kerberos attack decision tree, ACE/ACL abuse, ADCS ESC1-8, and AD misconfig checklist
1mitre-attack
MITRE ATT&CK framework reference — tactics, techniques, and tool-to-TTP mappings for pentest documentation and detection rule writing
1report-templates
CVSS 3.1 vector examples, executive summary template, full technical finding template, and remediation language bank for pentest reports
1wordlists
SecLists path map, hashcat rules, CeWL usage, and custom wordlist generation for all attack categories
1