Exploit Intelligence Platform eip-search CLI
Built on the shoulders of searchsploit and the ExploitDB legacy. eip-search adds NVD, CISA KEV, VulnCheck KEV, InTheWild.io, EPSS, Metasploit, GitHub, and nomi-sec — giving you CVSS scores, EPSS exploitation probability, ransomware attribution, exploit quality rankings, Nuclei scanner dorks, and AI-powered trojan detection across hundreds of thousands of vulnerabilities and exploits.
Installation
Install via APT (Kali/Debian/Ubuntu), pipx, or a virtual environment.
Kali 2024+ blocks global pip installs. Use the APT repo, pipx, or a virtual environment.
Verify Installation
eip-search --version eip-search stats
Offline Mode
All read-only commands work offline with a local SQLite database. Download once, search anywhere.
# Download the database (~200 MB compressed, ~900 MB on disk) eip-search update-db # Search locally eip-search --offline search "apache httpd" eip-search --offline info CVE-2024-3400 eip-search --offline analysis 61514 # Custom database path (implies --offline) eip-search --db /path/to/eip.db search "log4j"
Offline Exploit Code
Sync the exploit archive to view and download exploit source code offline. The archive contains ~22K repos (~28 GB).
# Sync exploit archives via rsync rsync -avz rsync://rsync.exploit-intel.com/exploits/ ~/eip-exploits/ # Add to ~/.eip-search.toml: # [offline] # exploits_dir = "~/eip-exploits" # Now view and download work offline eip-search --offline view CVE-2024-3400 eip-search --offline download 77423 -x
Real Examples
All output below is from real commands against the live platform.
CVE Sev CVSS EPSS Exp KEV Title CVE-2018-13379 CRITICAL 9.1 94.5% 58 KEV Fortinet FortiProxy Path Traversal CVE-2022-40684 CRITICAL 9.8 94.4% 64 KEV Fortinet FortiProxy Auth Bypass CVE-2023-48788 CRITICAL 9.8 94.2% 9 KEV Fortinet FortiClient SQL Injection CVE-2024-55591 CRITICAL 9.8 94.2% 17 KEV Fortinet FortiProxy Auth Bypass CVE-2022-42475 CRITICAL 9.8 94.0% 24 KEV Fortinet FortiOS Buffer Overflow Page 1/4 (19 total results)
CVE-2019-0708 CRITICAL KEV
BlueKeep RDP Remote Windows Kernel Use After Free
CVSS: 9.8 EPSS: 94.5% (100th percentile)
Exploits (487):
MODULES
metasploit ruby cve_2019_0708_bluekeep_rce.rb
Rank: manual LLM: working_poc
VERIFIED
exploitdb ruby EDB-47416
verified
PROOF OF CONCEPT
★ 1187 Ekultek/BlueKeep working_poc
★ 914 robertdavidgraham/rdpscan scanner
★ 497 n1xbyte/CVE-2019-0708 working_poc
... and 113 more
SUSPICIOUS
★ 2 ttsite/CVE-2019-0708-
⚠ TROJAN — flagged by AI analysis
TRIAGE — vulnerabilities with exploits, sorted by exploitation risk Filters: vendor=fortinet, severity=critical, EPSS>=0.5 CVE-2018-13379 CRITICAL 9.1 94.5% 58 KEV Fortinet FortiProxy CVE-2022-40684 CRITICAL 9.8 94.4% 64 KEV Fortinet FortiProxy CVE-2023-48788 CRITICAL 9.8 94.2% 9 KEV Fortinet FortiClient CVE-2024-55591 CRITICAL 9.8 94.2% 17 KEV Fortinet FortiProxy CVE-2022-42475 CRITICAL 9.8 94.0% 24 KEV Fortinet FortiOS
CVE-2024-27198 Nuclei Templates
CVE-2024-27198 ✓ verified critical
TeamCity < 2023.11.4 - Authentication Bypass
Author: DhiyaneshDk
Tags: cve, cve2024, teamcity, jetbrains, auth-bypass, kev
Recon Queries:
Shodan: http.component:"TeamCity" || http.title:teamcity
FOFA: title=teamcity
Google: intitle:teamcity
Run: nuclei -t CVE-2024-27198 -u https://target.com
Downloaded: nomisec-fullhunt_log4j-scan.zip ZIP password: eip (password-protected to prevent AV quarantine) Extracted: nomisec-fullhunt_log4j-scan/ Files (10): - fullhunt-log4j-scan-07f7e32/Dockerfile - fullhunt-log4j-scan-07f7e32/log4j-scan.py - fullhunt-log4j-scan-07f7e32/requirements.txt ...
Export a machine-readable list of recent high-risk findings: critical CVEs with public exploits, EPSS >= 0.5, sorted by exploitation probability, limited to 2024-2025 publication dates.
{
"total": 335,
"page": 1,
"per_page": 20,
"items": [
{
"id": "CVE-2024-27198",
"severity_label": "critical",
"cvss_v3_score": 9.8,
"epss_score": 0.946,
"exploit_count": 18,
"is_kev": true
}
]
}
ID CVE Sev Source Lang ★ Name 116091 -- metasploit ruby emacs_extension.rb 69916 CVE-2023-20198 CRITICAL metasploit ruby cisco_ios_xe_webui.rb 69997 CVE-2014-6041 -- metasploit ruby google_play_store_uxss.rb 70004 CVE-2024-21762 CRITICAL metasploit ruby fortios_sslvpn_rce.rb 68660 CVE-2024-3400 CRITICAL metasploit ruby panos_telemetry_cmd_exec.rb Page 1/462 (2,308 total results)
Chocapikk Exploits: 90 | Active since: 2017-04-25 ID CVE Sev Source Name 65938 CVE-2026-21858 CRITICAL nomisec Chocapikk/CVE-2026-21858 58681 CVE-2023-29357 CRITICAL nomisec Chocapikk/CVE-2023-29357 60976 CVE-2024-25600 CRITICAL nomisec Chocapikk/CVE-2024-25600 58150 CVE-2023-22515 CRITICAL nomisec Chocapikk/CVE-2023-22515 62136 CVE-2024-45519 CRITICAL nomisec Chocapikk/CVE-2024-45519 Page 1/18 (90 total exploits)
Reference Data
Browse authors, CWEs, vendors, and products, or resolve alternate identifiers to CVEs.