<head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>kali工具箱</title>
<script src="./static/bootstrap.min.js"></script>
<link rel="stylesheet" href="./static/main.css">
<link rel="stylesheet" href="./static/bootstrap.min.css">
<style type="text/css" id="syntaxhighlighteranchor"></style>
</head>
<main class="main-container ng-scope" ng-view="">
<div class="main receptacle post-view ng-scope">
<article class="entry ng-scope" ng-controller="EntryCtrl" ui-lightbox="">
<section class="entry-content ng-binding" ng-bind-html="postContentTrustedHtml">
<h2> exploitdb包装说明</h2><p style="text-align: justify;">检索归档来自该漏洞数据库。 </p><p> <a href="http://www.exploit-db.com" variation="deepblue" target="blank">exploitdb首页</a> | <a href="http://git.kali.org/gitweb/?p=packages/exploitdb.git;a=summary" variation="deepblue" target="blank">卡利exploitdb回购</a> </p><ul><li>作者：卡利的Linux </li><li>许可：GPL第二版</li></ul><h3>包含在exploitdb包工具</h3><h5> sea​​rchsploit - 实用工具来搜索漏洞数据库存档</h5><code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="cfbda0a0bb8fa4aea3a6">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# searchsploit -h<br>
Usage: searchsploit [options] term1 [term2] ... [termN]<br>
Example: searchsploit oracle windows local<br>
<br>
=======<br>
Options<br>
=======<br>
<br>
   -c                Perform case-sensitive searches; by default, searches will<br>
                      try to be greedy<br>
   -h, --help    Show help screen<br>
   -v                By setting verbose output, description lines are allowed to<br>
                      overflow their columns<br>
<br>
*NOTES*<br>
Use any number of search terms you would like (minimum of one).<br>
Search terms are not case sensitive, and order is irrelevant.</code><h3> exploitdb用法示例</h3><p>搜索<b><i><b><i>远程</i></b> Oracle</i></b>利用<b><i>的</i></b> Windows： </p><code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="b2c0ddddc6f2d9d3dedb">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# searchsploit oracle windows remote<br>
 Description                                                                    Path<br>
----------------------------------------------------------------------------- ----------------------------------<br>
Oracle XDB FTP Service UNLOCK Buffer Overflow Exploit                        | /windows/remote/80.c<br>
Oracle 9.2.0.1 Universal XDB HTTP Pass Overflow Exploit                      | /windows/remote/1365.pm<br>
Oracle 9i/10g ACTIVATE_SUBSCRIPTION SQL Injection Exploit                    | /windows/remote/3364.pl<br>
Oracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit             | /windows/remote/8336.pl<br>
Oracle Secure Backup Server 10.3.0.1.0 Auth Bypass/RCI Exploit               | /windows/remote/9652.sh</code><div style="display:none">
<script src="//s11.cnzz.com/z_stat.php?id=1260038378&web_id=1260038378" language="JavaScript"></script>
</div>
</main></body></html>
