Searching protocol for "searchsploit"
Find public exploits offline.
Identify and assess software vulnerabilities.