shodan_exploits_search
Search the Shodan Exploits database to find known vulnerabilities and exploits for specific CVEs, software, or ICS/SCADA systems.
Instructions
Search for exploits in the Shodan Exploits database. Useful for finding known exploits for specific CVEs or software. Critical for ICS/SCADA security assessments.
ICS/SCADA Exploit Examples:
"Modbus" - Modbus protocol exploits
"SCADA" - General SCADA vulnerabilities
"Siemens" - Siemens PLC/SCADA exploits
"Schneider Electric" - Schneider vulnerabilities
"Allen-Bradley" - Rockwell exploits
"CVE-2019-6575" - Modbus simulator vulnerability
"CVE-2020-15782" - BACnet buffer overflow
"type:remote platform:hardware" - Hardware-specific
"ICS" - Industrial Control System exploits
Common ICS CVE Searches:
Modbus vulnerabilities: Often memory corruption, authentication bypass
SCADA exploits: Remote code execution, denial of service
PLC exploits: Ladder logic manipulation, configuration changes
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| query | Yes | Search query. General: "microsoft", "CVE-2021-44228". ICS/SCADA: "Modbus", "SCADA", "Siemens", "Schneider", "ICS". Filters: "type:remote", "platform:hardware", "platform:linux" | |
| facets | No | Optional facets for aggregation. Common: "type,platform,author". For ICS: "type,platform" to see exploit categories. | |
| page | No | Page number (default: 1) |