20 July 2011 | 12,775 views

exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).

Check For Vulnerabilities with Acunetix

This is a simple Python tool to help you search for exploits in the BackTrack Exploit Database.


  • Search the exploitdb archive
  • Case sensitive & insensitive
  • Change output mode
  • Automatically copy your exploits


  • python (tested with python 2.7.1 and 2.5.2)
  • local exploitdb (pre-installed on BackTrack Linux)


You can download exploitdbee.py v1.0 here:


Or read more here.


Recent in Exploits/Vulnerabilities:
- The Logjam Attack – ANOTHER Critical TLS Weakness
- WordPress Critical Zero-Day Vulnerability Fixed In A Hurry
- Commix – Command Injection Attack Tool

Related Posts:
- Durzosploit v0.1 – JavaScript Exploit Generation Framework
- The Mole v0.3 Released For Download – Automatic SQL Injection Exploitation Tool
- tcpxtract – Extract Files from Network Traffic AKA Carving

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 230,684 views
- AJAX: Is your application secure enough? - 119,545 views
- eEye Launches 0-Day Exploit Tracker - 85,229 views

Advertise on Darknet

3 Responses to “exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).”

  1. s3my0n 20 July 2011 at 5:59 pm Permalink

    MUCH better tool (getsploits.py) with more options can be found here:


    Don’t know why it isn’t on the post instead of exploitdbee …

    • Darknet 21 July 2011 at 7:29 am Permalink

      No one told us about it – how are we supposed to know?

      • s3my0n 21 July 2011 at 6:40 pm Permalink

        lol yeah that’s a valid point :)

        Maybe include it in the next post? :P