Examples
It it used to search anything you want in Metasploit.search
Usage: search [<options>] [<keywords>]
If no options or keywords are provided, cached results are displayed.
OPTIONS:
-h Show this help information
-o <file> Send output to a file in csv format
-S <string> Search string for row filter
-u Use module if there is one result
Keywords:
- aka Modules with a matching AKA (also-known-as) name
- author Modules written by this author
- arch Modules affecting this architecture
- bid Modules with a matching Bugtraq ID
- cve Modules with a matching CVE ID
- edb Modules with a matching Exploit-DB ID
- check Modules that support the 'check' method
- date Modules with a matching disclosure date
- description Modules with a matching description
- fullname Modules with a matching full name
- mod_time Modules with a matching modification date
- name Modules with a matching descriptive name
- path Modules with a matching path
- platform Modules affecting this platform
- port Modules with a matching port
- rank Modules with a matching rank (Can be descriptive (ex: 'good') or numeric with comparison operators (ex: 'gte400'))
- ref Modules with a matching ref
- reference Modules with a matching reference
- target Modules affecting this target
- type Modules of a specific type (exploit, payload, auxiliary, encoder, evasion, post or nop)
Examples:
> search name:windows type:exploit
> search name:unix type:exploit
>search name:windows type:payload
>search name:windows date:2019