Known vulnerabilities
Theory
Practice
# search exploits for a technology
searchsploit $technology
# Read an exploit
searchsploit -x $exploit_path
# Copy an exploit to the current directory
searchsploit -m $exploit_path
# Update the searchsploit database
searchsploit -uLast updated
Was this helpful?