Skip to content

Commit 1107a48

Browse files
xer0dayz1N3
authored andcommitted
Updated NMAP/Metasploit modules 7/26/2020
1 parent a01e934 commit 1107a48

8 files changed

Lines changed: 3988 additions & 4325 deletions

File tree

findsploit

Lines changed: 20 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@
77

88
clear
99

10-
VER='1.9'
11-
SEARCHSPLOIT_SCRIPT='/usr/bin/searchsploit'
10+
VER='2.0'
11+
SEARCHSPLOIT_SCRIPT='/usr/bin/searchsploit'
1212
NMAP_SCRIPTS='/usr/share/findsploit/nmap/nmap'
1313
MSF_SEARCH_DIR='/usr/share/findsploit/msf_search'
14-
BROWSER_CMD='xdg-open'
14+
BROWSER_CMD='firefox'
1515
VAR1=$1;
1616
VAR2=$2;
1717
VAR3=$3;
@@ -88,26 +88,6 @@ if [[ "$1" == "--update" || "$1" == "-u" ]];
8888
then
8989
update
9090
exit
91-
elif [[ "$1" == "auxiliary" ]];
92-
then
93-
logo
94-
cat $MSF_SEARCH_DIR/auxiliary
95-
exit
96-
elif [[ "$1" == "encoders" ]];
97-
then
98-
logo
99-
cat $MSF_SEARCH_DIR/encoders
100-
exit
101-
elif [[ "$1" == "exploits" ]];
102-
then
103-
logo
104-
cat $MSF_SEARCH_DIR/exploits
105-
exit
106-
elif [[ "$1" == "payloads" ]];
107-
then
108-
logo
109-
cat $MSF_SEARCH_DIR/payloads
110-
exit
11191
else
11292
DIR=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )
11393
logo
@@ -124,30 +104,27 @@ else
124104
echo -e "$OKRED + -- --=[ EXPLOITDB EXPLOITS $RESET"
125105
echo ""
126106
$SEARCHSPLOIT_SCRIPT $VARS
127-
echo ""
128-
VAR1=$(echo ${VAR1}| sed 's/\s\+/\%20/g')
129-
VAR2=$(echo ${VAR2}| sed 's/\s\+/\%20/g')
130-
VAR3=$(echo ${VAR3}| sed 's/\s\+/\%20/g')
131-
echo "https://www.exploit-db.com/search?q=${VAR1}+${VAR2}+${VAR3}"
132-
echo "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+exploit"
133-
echo "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+exploit+site:www.securityfocus.com"
134-
echo "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+site:0day.today"
135-
echo "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+site:www.security-database.com"
136-
echo "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+site:packetstormsecurity.com"
137-
echo "https://exploits.shodan.io/?q=${VAR1}+${VAR2}+${VAR3}"
138-
echo "https://vulners.com/search?query=${VAR1}+${VAR2}+${VAR3}"
107+
echo ""
108+
echo 'https://www.exploit-db.com/search?q='$VAR1'+'$VAR2'+'$VAR3
109+
echo 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+exploit'
110+
echo 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+exploit+site:www.securityfocus.com'
111+
echo 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+site:0day.today'
112+
echo 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+site:www.security-database.com'
113+
echo 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+site:packetstormsecurity.com'
114+
echo 'https://exploits.shodan.io/?q='$VAR1'+'$VAR2'+'$VAR3
115+
echo 'https://vulners.com/search?query='$VAR1'+'$VAR2'+'$VAR3
139116
echo ""
140117
echo -e "$OKORANGE + -- --=[ Press any key to search online or Ctrl+C to exit...$RESET"
141118
read test
142119
$BROWSER_CMD 'https://xerosecurity.com' 2> /dev/null &
143120
sleep 5
144-
$BROWSER_CMD "https://www.exploit-db.com/search?q=${VAR1}+${VAR2}+${VAR3}" 2>/dev/null &> /dev/null
145-
$BROWSER_CMD "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+exploit" 2>/dev/null &> /dev/null
146-
$BROWSER_CMD "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+exploit+site:www.securityfocus.com" 2> /dev/null &> /dev/null
147-
$BROWSER_CMD "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+site:0day.today" 2> /dev/null &> /dev/null
148-
$BROWSER_CMD "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+site:www.security-database.com" 2> /dev/null
149-
$BROWSER_CMD "https://www.google.ca/search?q=${VAR1}%20${VAR2}%20${VAR3}+site:packetstormsecurity.com" 2> /dev/null &> /dev/null
150-
$BROWSER_CMD "https://exploits.shodan.io/?q=${VAR1}+${VAR2}+${VAR3}" 2> /dev/null &> /dev/null
151-
$BROWSER_CMD "https://vulners.com/search?query=${VAR1}+${VAR2}+${VAR3}" 2> /dev/null &> /dev/null
121+
$BROWSER_CMD 'https://www.exploit-db.com/search?q='$VAR1'+'$VAR2'+'$VAR3 2>/dev/null &> /dev/null
122+
$BROWSER_CMD 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+exploit' 2>/dev/null &> /dev/null
123+
$BROWSER_CMD 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+exploit+site:www.securityfocus.com' 2> /dev/null &> /dev/null
124+
$BROWSER_CMD 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+site:0day.today' 2> /dev/null &> /dev/null
125+
$BROWSER_CMD 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+site:www.security-database.com' 2> /dev/null
126+
$BROWSER_CMD 'https://www.google.ca/search?q='$VAR1'%20'$VAR2'%20'$VAR3'+site:packetstormsecurity.com' 2> /dev/null &> /dev/null
127+
$BROWSER_CMD 'https://exploits.shodan.io/?q='$VAR1'+'$VAR2'+'$VAR3 2> /dev/null &> /dev/null
128+
$BROWSER_CMD 'https://vulners.com/search?query='$VAR1'+'$VAR2'+'$VAR3 2> /dev/null &> /dev/null
152129
fi
153130
exit

install.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ rm -Rf $FINDSPLOIT_INSTALL_DIR 2> /dev/null
2929
mkdir -p $FINDSPLOIT_INSTALL_DIR 2> /dev/null
3030
cp -Rf $PWD/* $FINDSPLOIT_INSTALL_DIR
3131
cd $FINDSPLOIT_INSTALL_DIR
32-
apt-get install -y exploitdb xdg-utils
32+
apt-get install -y exploitdb
3333
mkdir loot 2> /dev/null
3434
chmod +x $FINDSPLOIT_INSTALL_DIR/findsploit
3535
chmod +x $FINDSPLOIT_INSTALL_DIR/copysploit

0 commit comments

Comments
 (0)