There are several parameters you can search for using searchsploit; try the following examples.
- The following command will search just the titles of the exploit database for windows and remote, allowing you to find the potential remote windows vulnerabilities:
searchsploit -t windows remote
- If you exported your nmap or zenmap results in an XML format, you can search against that for exploits. Run a quick nmap and output its results to /root/test.xml. The following command is used to search against that output file and will provide you with a list of exploits for your nmap search:
searchsploit --nmap /root/test.xml