To use this script, you will need to have a Unix-like operating system, such as Linux or macOS, and have the bash shell installed. You will also need to have the wget and less command-line tools installed.
To download the script, navigate to the repository's page on GitHub and click the "Clone or download" button. This will give you the option to either download a zip file of the repository or to clone the repository using a Git client.
To clone the repository using a Git client, you will need to have Git installed on your computer. Once you have Git installed, you can use the following command to clone the repository:
git clone https://github.com/ErvisTusha/sploiter.git
This will create a new directory on your computer with the contents of the repository.
To run the script, open a terminal and navigate to the directory where you cloned the repository. Then, run the following command:
sploiter [OPTIONS] [SEARCH TERM]
Replace [OPTIONS] with one of the available options for the script, and [SEARCH TERM] with the search term you want to use. The available options for the script are:
-uor--update: Downloads the latest version of the exploit database. This option requiresrootprivileges.-sor--search: Searches the exploit database for exploits matching the given search term.-dor--download: Downloads the exploit with the given ID from the database.
For example, to search the exploit database for exploits related to "Joomla", you can use the following command:
sploiter --search Joomla
sploiter Joomla
This will search the exploit database for exploits containing the term "Joomla" in the title or file name, and print a list of matching exploits with their IDs and titles. To download one of the matching exploits, you can use the --download option and specify the ID of the exploit you want to download. For example, to download the exploit with ID "12345", you can use the following command:
Copy code
sploiter --download 12345
sploiter 12345
This will download the exploit with ID "12345" from the database and save it to the current directory. You can then use the exploit as needed.
Please note that this script is provided for educational purposes only and should not be used for illegal activities. Use of this script and the exploits it provides is at your own risk.