{"id":13494802,"url":"https://github.com/vulnersCom/getsploit","last_synced_at":"2025-03-28T14:31:54.732Z","repository":{"id":44164138,"uuid":"93303409","full_name":"vulnersCom/getsploit","owner":"vulnersCom","description":"Command line utility for searching and downloading exploits","archived":false,"fork":false,"pushed_at":"2024-06-09T20:15:41.000Z","size":50,"stargazers_count":1755,"open_issues_count":11,"forks_count":245,"subscribers_count":101,"default_branch":"master","last_synced_at":"2025-03-27T05:07:25.049Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"lgpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/vulnersCom.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-06-04T09:31:44.000Z","updated_at":"2025-03-25T17:56:27.000Z","dependencies_parsed_at":"2024-06-20T23:30:21.313Z","dependency_job_id":"85930d9e-db91-41ab-b176-22094b996b1d","html_url":"https://github.com/vulnersCom/getsploit","commit_stats":{"total_commits":34,"total_committers":4,"mean_commits":8.5,"dds":0.1470588235294118,"last_synced_commit":"bcab2ee9e7ec124d05a5b2314701703943a372b9"},"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/vulnersCom%2Fgetsploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/vulnersCom%2Fgetsploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/vulnersCom%2Fgetsploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/vulnersCom%2Fgetsploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/vulnersCom","download_url":"https://codeload.github.com/vulnersCom/getsploit/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246046113,"owners_count":20714907,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T19:01:28.397Z","updated_at":"2025-03-28T14:31:54.702Z","avatar_url":"https://github.com/vulnersCom.png","language":"Python","readme":"# getsploit\n\n[![Current Release](https://img.shields.io/github/release/vulnersCom/getsploit.svg \"Current Release\")](https://github.com/vulnersCom/getsploit/releases/latest)\n[![Downloads](https://img.shields.io/github/downloads/vulnersCom/getsploit/total.svg \"Downloads\")](https://github.com/vulnersCom/getsploit/releases) \n\n# Description\nInspired by [searchsploit](https://github.com/offensive-security/exploit-database/blob/master/searchsploit), it combines two features: command line search and download tool.\nIt allows you to search online for the exploits across all the most popular collections: *Exploit-DB*, *Metasploit*, *Packetstorm* and others.\nThe most powerful feature is immediate *exploit source download* right in your working path.\n\n# Python version\nUtility was tested on *python2.7*, *python3.8+* with SQLite FTS4 support. If you have found any bugs, don't hesitate to create an issue\n\n# How to use\n\nInstall: `pip install getsploit`\n\n# Obtain Vulners API key\n\nPlease, register at [Vulners website](https://vulners.com).\nGo to the personal menu by clicking on your name in the right top corner.\nFollow \"API KEYS\" tab.\nGenerate API key with scope \"api\" and use it with the getsploit.\n\n# Search\n```\n# pip install getsploit\n# getsploit wordpress 4.7.0\nTotal found exploits: 8\nWeb-search URL: https://vulners.com/search?query=bulletinFamily%3Aexploit%20AND%20wordpress%204.7.0\n+----------------------+--------------------------------+----------------------------------------------------+\n|          ID          |         Exploit Title          |                        URL                         |\n+======================+================================+====================================================+\n|  PACKETSTORM:141039  | WordPress 4.7.0 / 4.7.1 Insert | https://vulners.com/packetstorm/PACKETSTORM:141039 |\n|                      | PHP Code Injection             |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|     EDB-ID:41308     | WordPress 4.7.0/4.7.1 Plugin   |     https://vulners.com/exploitdb/EDB-ID:41308     |\n|                      | Insert PHP - PHP Code          |                                                    |\n|                      | Injection                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|     EDB-ID:41223     | WordPress 4.7.0/4.7.1 -        |     https://vulners.com/exploitdb/EDB-ID:41223     |\n|                      | Unauthenticated Content        |                                                    |\n|                      | Injection (PoC)                |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|  PACKETSTORM:140893  | WordPress 4.7.0 / 4.7.1 REST   | https://vulners.com/packetstorm/PACKETSTORM:140893 |\n|                      | API Privilege Escalation       |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|  PACKETSTORM:140902  | WordPress 4.7.0 / 4.7.1        | https://vulners.com/packetstorm/PACKETSTORM:140902 |\n|                      | Content Injection / Code       |                                                    |\n|                      | Execution                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|  PACKETSTORM:140901  | WordPress 4.7.0 / 4.7.1        | https://vulners.com/packetstorm/PACKETSTORM:140901 |\n|                      | Content Injection Proof Of     |                                                    |\n|                      | Concept                        |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|     EDB-ID:41224     | WordPress 4.7.0/4.7.1 -        |     https://vulners.com/exploitdb/EDB-ID:41224     |\n|                      | Unauthenticated Content        |                                                    |\n|                      | Injection Arbitrary Code       |                                                    |\n|                      | Execution                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|      SSV-92637       | WordPress REST API content     |        https://vulners.com/seebug/SSV-92637        |\n|                      | injection                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n```\n\n# Save exploit files\n```\n# getsploit -m wordpress 4.7.0\nTotal found exploits: 8\nWeb-search URL: https://vulners.com/search?query=bulletinFamily%3Aexploit%20AND%20wordpress%204.7.0\n+----------------------+--------------------------------+----------------------------------------------------+\n|          ID          |         Exploit Title          |                        URL                         |\n+======================+================================+====================================================+\n|  PACKETSTORM:141039  | WordPress 4.7.0 / 4.7.1 Insert | https://vulners.com/packetstorm/PACKETSTORM:141039 |\n|                      | PHP Code Injection             |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|     EDB-ID:41308     | WordPress 4.7.0/4.7.1 Plugin   |     https://vulners.com/exploitdb/EDB-ID:41308     |\n|                      | Insert PHP - PHP Code          |                                                    |\n|                      | Injection                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|     EDB-ID:41223     | WordPress 4.7.0/4.7.1 -        |     https://vulners.com/exploitdb/EDB-ID:41223     |\n|                      | Unauthenticated Content        |                                                    |\n|                      | Injection (PoC)                |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|  PACKETSTORM:140893  | WordPress 4.7.0 / 4.7.1 REST   | https://vulners.com/packetstorm/PACKETSTORM:140893 |\n|                      | API Privilege Escalation       |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|  PACKETSTORM:140902  | WordPress 4.7.0 / 4.7.1        | https://vulners.com/packetstorm/PACKETSTORM:140902 |\n|                      | Content Injection / Code       |                                                    |\n|                      | Execution                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|  PACKETSTORM:140901  | WordPress 4.7.0 / 4.7.1        | https://vulners.com/packetstorm/PACKETSTORM:140901 |\n|                      | Content Injection Proof Of     |                                                    |\n|                      | Concept                        |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|     EDB-ID:41224     | WordPress 4.7.0/4.7.1 -        |     https://vulners.com/exploitdb/EDB-ID:41224     |\n|                      | Unauthenticated Content        |                                                    |\n|                      | Injection Arbitrary Code       |                                                    |\n|                      | Execution                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n|      SSV-92637       | WordPress REST API content     |        https://vulners.com/seebug/SSV-92637        |\n|                      | injection                      |                                                    |\n+----------------------+--------------------------------+----------------------------------------------------+\n\n# ls\nLICENSE         README.md       getsploit.py    wordpress-470\n# cd wordpress-470\n# ls\nedb-id41223.txt         edb-id41224.txt         edb-id41308.txt         packetstorm140893.txt   packetstorm140901.txt   packetstorm140902.txt   packetstorm141039.txt   ssv-92637.txt\n```\n\n# Local database\nIf your Python supports sqlite3 lib(builtin) you can use *--update* and *--local* commands to download whole exploit database to your PC.\nAfter update you can perform local offline searches.\n\n```\n# getsploit --update\nDownloading getsploit database archive. Please wait, it may take time. Usually around 5-10 minutes.\n219642496/219642496 [100.00%]\nUnpacking database.\nDatabase download complete. Now you may search exploits using --local key './getsploit.py -l wordpress 4.7'\n```\n","funding_links":[],"categories":["Python","Miscellaneous","Python (1887)","others"],"sub_categories":["Vulnerability Scanners"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FvulnersCom%2Fgetsploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FvulnersCom%2Fgetsploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FvulnersCom%2Fgetsploit/lists"}