Search Exploits
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Always search in "google" or others: <service_name> [version] exploit
You should also try the shodan exploit search from https://exploits.shodan.io/.
Useful to search exploits for services in exploitdb from the console.
https://github.com/rfunix/Pompem is another tool to search for exploits
If nothing is found, try to search the used technology inside https://packetstormsecurity.com/
You can also search in vulners database: https://vulners.com/
This searches for exploits in other databases: https://sploitus.com/
GTFOBins-like curated list of exploits with filters by vulnerability type (Local Privilege Escalation, Remote Code execution, etc), service type (Web, SMB, SSH, RDP, etc), OS and practice labs (links to machines where you can play with sploits): https://sploitify.haxx.it
search_vulns enables you to search for known vulnerabilities and exploits as well: https://search-vulns.com/. It utilizes various data sources like the NVD, the Exploit-DB, PoC-in-GitHub, the GitHub Security Advisory database and endoflife.date.
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)