01Search exploits by keywords with flexible options (case-sensitive, exact match, title-only)
02Update the local Exploit-DB database directly
03Search for exploits using specific CVE identifiers
042 GitHub stars
05Retrieve full local file system paths and content of exploits by Exploit-DB ID
06Mirror exploit files to a specified directory for local analysis