20 July 2011 | 12,582 views

exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).

Acunetix Web Application Security

This is a simple Python tool to help you search for exploits in the BackTrack Exploit Database.


  • Search the exploitdb archive
  • Case sensitive & insensitive
  • Change output mode
  • Automatically copy your exploits


  • python (tested with python 2.7.1 and 2.5.2)
  • local exploitdb (pre-installed on BackTrack Linux)


You can download exploitdbee.py v1.0 here:


Or read more here.


Recent in Exploits/Vulnerabilities:
- Heartbleed Bug SSL Vulnerability – Everything You Need To Know
- Oracle Java Cloud Service Vulnerabilities Publicly Disclosed
- ODA – Online Web Based Disassembler

Related Posts:
- Durzosploit v0.1 – JavaScript Exploit Generation Framework
- tcpxtract – Extract Files from Network Traffic AKA Carving
- The Mole v0.3 Released For Download – Automatic SQL Injection Exploitation Tool

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 225,329 views
- AJAX: Is your application secure enough? - 118,949 views
- eEye Launches 0-Day Exploit Tracker - 84,996 views

Low-cost VPS Hosting

3 Responses to “exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).”

  1. s3my0n 20 July 2011 at 5:59 pm Permalink

    MUCH better tool (getsploits.py) with more options can be found here:


    Don’t know why it isn’t on the post instead of exploitdbee …

    • Darknet 21 July 2011 at 7:29 am Permalink

      No one told us about it – how are we supposed to know?

      • s3my0n 21 July 2011 at 6:40 pm Permalink

        lol yeah that’s a valid point :)

        Maybe include it in the next post? :P