Skip to content

acap4z/ajax-edb

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AJAX-EDB

AJAX-EDB is an UNOFFICIAL client-side search tool based on HTML, JavaScript and AJAX, which uses the data available in the Official Exploit-DB GitHub repository to search, filter and find exploits in a similar way that you would do in the official Exploit-DB Website.

Data is loaded once in your Browser. This means that all the queries you launch in the tool are offline, resulting in noticeably faster results. Moreover, CAPTCHAS are never needed, since there is no server behind the responses. If you want to drill-in an specific exploit, the links will redirect you to the details page at the official Website. The same rule applies for exploit and shellcode downloads.

Since the data comes from the Official Exploit-DB repository, you may expect it to be up to date with 1-day margin. However, if you want to stay on the cutting edge, the official Website is the only way to go.

In short terms, you could consider this tool as an hybrid between the Exploit-DB official Website, and the official 'Searchsploit' command line tool.

How to use

  1. Go to https://acap4z.github.io/ajax-edb/

  2. Wait for the tool to retrieve the data (it should take a few seconds only).

  3. Make your queries in the search box. In the main page, you can also view the latest exploits loaded into the tool.

Labels

Some shortcuts have been implemented in case you want to make a more detailed query. One of these are Labels, which allow you to search by a given attribute with the label:value syntax. Currently, supported labels are: platform, author, type and filetype.

Examples:

  1. If you want to search an exploit for Apache which is compatible with the 'windows' platform, you can issue the following query: platform:windows apache

  2. If you are interested in all the exploits available for WordPress whose author is 'Metasploit', you can consult it with: author:metasploit wordpress

  3. If you are looking for remote execution exploits, you may want to add the following label to your query: category:remote *Available categories are: dos, local, remote, shellcode, webapps

  4. If you want to gather all available PowerShell scripts in Exploit-DB, you can do it with the following query: filetype:ps1

Operands

Another kind of shortcut implemented in the tool are Operands. These could help you to filter matching results.

  • Exclusion Operand: If you type the "-" character before any keyword, that keyword will be excluded from the search results.
  • Shellcode Operand: From 2017-11-28, the ExploitDB team splitted their single CSV file into two new files: one for exploits, and another for shellcodes. If you include the word "shellcode" in your search, the tool will switch from the default exploits list to the shellcode list automatically. This means no exploits will be shown.

For example, if you want all exploits available for WordPress whose author is 'Metasploit', but you don't want to retrieve results for plugins, you can specify it as follows: author:metasploit wordpress -plugin

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published