77
88clear
99
10- VER=' 1.9 '
11- SEARCHSPLOIT_SCRIPT=' /usr/bin/searchsploit'
10+ VER=' 2.0 '
11+ SEARCHSPLOIT_SCRIPT=' /usr/bin/searchsploit'
1212NMAP_SCRIPTS=' /usr/share/findsploit/nmap/nmap'
1313MSF_SEARCH_DIR=' /usr/share/findsploit/msf_search'
14- BROWSER_CMD=' xdg-open '
14+ BROWSER_CMD=' firefox '
1515VAR1=$1 ;
1616VAR2=$2 ;
1717VAR3=$3 ;
@@ -88,26 +88,6 @@ if [[ "$1" == "--update" || "$1" == "-u" ]];
8888then
8989 update
9090 exit
91- elif [[ " $1 " == " auxiliary" ]];
92- then
93- logo
94- cat $MSF_SEARCH_DIR /auxiliary
95- exit
96- elif [[ " $1 " == " encoders" ]];
97- then
98- logo
99- cat $MSF_SEARCH_DIR /encoders
100- exit
101- elif [[ " $1 " == " exploits" ]];
102- then
103- logo
104- cat $MSF_SEARCH_DIR /exploits
105- exit
106- elif [[ " $1 " == " payloads" ]];
107- then
108- logo
109- cat $MSF_SEARCH_DIR /payloads
110- exit
11191else
11292 DIR=$( cd " $( dirname " ${BASH_SOURCE[0]} " ) " && pwd )
11393 logo
@@ -124,30 +104,27 @@ else
124104 echo -e " $OKRED + -- --=[ EXPLOITDB EXPLOITS $RESET "
125105 echo " "
126106 $SEARCHSPLOIT_SCRIPT $VARS
127- echo " "
128- VAR1=$( echo ${VAR1} | sed ' s/\s\+/\%20/g' )
129- VAR2=$( echo ${VAR2} | sed ' s/\s\+/\%20/g' )
130- VAR3=$( echo ${VAR3} | sed ' s/\s\+/\%20/g' )
131- echo " https://www.exploit-db.com/search?q=${VAR1} +${VAR2} +${VAR3} "
132- echo " https://www.google.ca/search?q=${VAR1} %20${VAR2} %20${VAR3} +exploit"
133- echo " https://www.google.ca/search?q=${VAR1} %20${VAR2} %20${VAR3} +exploit+site:www.securityfocus.com"
134- echo " https://www.google.ca/search?q=${VAR1} %20${VAR2} %20${VAR3} +site:0day.today"
135- echo " https://www.google.ca/search?q=${VAR1} %20${VAR2} %20${VAR3} +site:www.security-database.com"
136- echo " https://www.google.ca/search?q=${VAR1} %20${VAR2} %20${VAR3} +site:packetstormsecurity.com"
137- echo " https://exploits.shodan.io/?q=${VAR1} +${VAR2} +${VAR3} "
138- echo " https://vulners.com/search?query=${VAR1} +${VAR2} +${VAR3} "
107+ echo " "
108+ echo ' https://www.exploit-db.com/search?q=' $VAR1 ' +' $VAR2 ' +' $VAR3
109+ echo ' https://www.google.ca/search?q=' $VAR1 ' %20' $VAR2 ' %20' $VAR3 ' +exploit'
110+ echo ' https://www.google.ca/search?q=' $VAR1 ' %20' $VAR2 ' %20' $VAR3 ' +exploit+site:www.securityfocus.com'
111+ echo ' https://www.google.ca/search?q=' $VAR1 ' %20' $VAR2 ' %20' $VAR3 ' +site:0day.today'
112+ echo ' https://www.google.ca/search?q=' $VAR1 ' %20' $VAR2 ' %20' $VAR3 ' +site:www.security-database.com'
113+ echo ' https://www.google.ca/search?q=' $VAR1 ' %20' $VAR2 ' %20' $VAR3 ' +site:packetstormsecurity.com'
114+ echo ' https://exploits.shodan.io/?q=' $VAR1 ' +' $VAR2 ' +' $VAR3
115+ echo ' https://vulners.com/search?query=' $VAR1 ' +' $VAR2 ' +' $VAR3
139116 echo " "
140117 echo -e " $OKORANGE + -- --=[ Press any key to search online or Ctrl+C to exit...$RESET "
141118 read test
142119 $BROWSER_CMD ' https://xerosecurity.com' 2> /dev/null &
143120 sleep 5
144- $BROWSER_CMD " https://www.exploit-db.com/search?q=${ VAR1} + ${ VAR2} + ${ VAR3} " 2> /dev/null & > /dev/null
145- $BROWSER_CMD " https://www.google.ca/search?q=${ VAR1} %20${ VAR2} %20${ VAR3} +exploit" 2> /dev/null & > /dev/null
146- $BROWSER_CMD " https://www.google.ca/search?q=${ VAR1} %20${ VAR2} %20${ VAR3} +exploit+site:www.securityfocus.com" 2> /dev/null & > /dev/null
147- $BROWSER_CMD " https://www.google.ca/search?q=${ VAR1} %20${ VAR2} %20${ VAR3} +site:0day.today" 2> /dev/null & > /dev/null
148- $BROWSER_CMD " https://www.google.ca/search?q=${ VAR1} %20${ VAR2} %20${ VAR3} +site:www.security-database.com" 2> /dev/null
149- $BROWSER_CMD " https://www.google.ca/search?q=${ VAR1} %20${ VAR2} %20${ VAR3} +site:packetstormsecurity.com" 2> /dev/null & > /dev/null
150- $BROWSER_CMD " https://exploits.shodan.io/?q=${ VAR1} + ${ VAR2} + ${ VAR3} " 2> /dev/null & > /dev/null
151- $BROWSER_CMD " https://vulners.com/search?query=${ VAR1} + ${ VAR2} + ${ VAR3} " 2> /dev/null & > /dev/null
121+ $BROWSER_CMD ' https://www.exploit-db.com/search?q=' $ VAR1' + ' $ VAR2' + ' $ VAR3 2> /dev/null & > /dev/null
122+ $BROWSER_CMD ' https://www.google.ca/search?q=' $ VAR1' %20' $ VAR2' %20' $ VAR3' +exploit' 2> /dev/null & > /dev/null
123+ $BROWSER_CMD ' https://www.google.ca/search?q=' $ VAR1' %20' $ VAR2' %20' $ VAR3' +exploit+site:www.securityfocus.com' 2> /dev/null & > /dev/null
124+ $BROWSER_CMD ' https://www.google.ca/search?q=' $ VAR1' %20' $ VAR2' %20' $ VAR3' +site:0day.today' 2> /dev/null & > /dev/null
125+ $BROWSER_CMD ' https://www.google.ca/search?q=' $ VAR1' %20' $ VAR2' %20' $ VAR3' +site:www.security-database.com' 2> /dev/null
126+ $BROWSER_CMD ' https://www.google.ca/search?q=' $ VAR1' %20' $ VAR2' %20' $ VAR3' +site:packetstormsecurity.com' 2> /dev/null & > /dev/null
127+ $BROWSER_CMD ' https://exploits.shodan.io/?q=' $ VAR1' + ' $ VAR2' + ' $ VAR3 2> /dev/null & > /dev/null
128+ $BROWSER_CMD ' https://vulners.com/search?query=' $ VAR1' + ' $ VAR2' + ' $ VAR3 2> /dev/null & > /dev/null
152129fi
153130exit
0 commit comments