ExploitDB plugin added
This commit is contained in:
@@ -171,6 +171,68 @@ Common Search Filters:
|
||||
http.title:"admin" - HTTP page title contains
|
||||
```
|
||||
|
||||
### 🔍 DNSDumpster Reconnaissance
|
||||
|
||||
**🌐 !dnsdumpster [domain]**
|
||||
Comprehensive DNS reconnaissance and attack surface mapping using DNSDumpster.com API.
|
||||
|
||||
**Commands:**
|
||||
- `!dnsdumpster <domain>` - Complete DNS reconnaissance for any domain
|
||||
- `!dnsdumpster test` - Test API connection and key validity
|
||||
|
||||
**Features:**
|
||||
- **A Records**: All IPv4 addresses with geographic and ASN information
|
||||
- **NS Records**: Complete name server information with IP locations
|
||||
- **MX Records**: All mail servers with geographic data
|
||||
- **CNAME Records**: Full alias chain mappings
|
||||
- **TXT Records**: All text records including SPF, DKIM, verification records
|
||||
- **Additional Records**: AAAA, SRV, SOA, PTR records when available
|
||||
- **Web Services**: HTTP/HTTPS service detection with banner information
|
||||
|
||||
**Examples:**
|
||||
```bash
|
||||
!dnsdumpster google.com
|
||||
!dnsdumpster github.com
|
||||
!dnsdumpster example.com
|
||||
!dnsdumpster test
|
||||
|
||||
Data Returned:
|
||||
Total record counts for each type
|
||||
IP addresses with country and ASN information
|
||||
Web server banners and technologies
|
||||
Complete subdomain and host mappings
|
||||
Geographic distribution of services
|
||||
Requires DNSDUMPSTER_KEY environment variable in .env file
|
||||
```
|
||||
|
||||
## ExploitDB Plugin
|
||||
|
||||
A security plugin that searches Exploit-DB for vulnerabilities and exploits directly from Matrix.
|
||||
|
||||
### Features
|
||||
- Searches the official Exploit-DB CSV database for security exploits
|
||||
- Provides direct links to exploit details
|
||||
- Fallback to web search when CSV lookup fails
|
||||
- Configurable result limits (1-10)
|
||||
- Formatted output with exploit metadata
|
||||
|
||||
### Commands
|
||||
- `!exploitdb <search term> [max_results]` - Search Exploit-DB for vulnerabilities
|
||||
|
||||
### Examples
|
||||
```
|
||||
!exploitdb wordpress
|
||||
!exploitdb apache 3
|
||||
!exploitdb windows privilege escalation
|
||||
!exploitdb android 10
|
||||
```
|
||||
### Usage Notes
|
||||
- Maximum results limited to 10 for performance
|
||||
- Results include: title, EDB-ID, type, platform, author, date, and direct URL
|
||||
- Includes responsible disclosure reminder
|
||||
- Automatically falls back to search links if CSV database is unavailable
|
||||
|
||||
|
||||
### AI & Generation Commands
|
||||
|
||||
**🤖 AI Commands (!tech, !music, !eth, etc.)**
|
||||
|
||||
Reference in New Issue
Block a user