20 July 2011 | 12,729 views

exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).

Don't let a Dragon into your website!

This is a simple Python tool to help you search for exploits in the BackTrack Exploit Database.


  • Search the exploitdb archive
  • Case sensitive & insensitive
  • Change output mode
  • Automatically copy your exploits


  • python (tested with python 2.7.1 and 2.5.2)
  • local exploitdb (pre-installed on BackTrack Linux)


You can download exploitdbee.py v1.0 here:


Or read more here.

Recent in Exploits/Vulnerabilities:
- GHOST Vulnerability In glibc – Everything You Need To Know
- Flash Zero Day Being Exploited In The Wild
- OpenVAS 7 Released – Open Source Vulnerability Scanner

Related Posts:
- Durzosploit v0.1 – JavaScript Exploit Generation Framework
- The Mole v0.3 Released For Download – Automatic SQL Injection Exploitation Tool
- tcpxtract – Extract Files from Network Traffic AKA Carving

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 229,283 views
- AJAX: Is your application secure enough? - 119,368 views
- eEye Launches 0-Day Exploit Tracker - 85,188 views

Advertise on Darknet

3 Responses to “exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).”

  1. s3my0n 20 July 2011 at 5:59 pm Permalink

    MUCH better tool (getsploits.py) with more options can be found here:


    Don’t know why it isn’t on the post instead of exploitdbee …

    • Darknet 21 July 2011 at 7:29 am Permalink

      No one told us about it – how are we supposed to know?

      • s3my0n 21 July 2011 at 6:40 pm Permalink

        lol yeah that’s a valid point :)

        Maybe include it in the next post? :P