Return all exploits belonging to a particular platform

For example

hardware

windows

multiple

php

linux

GET /searchindex/exploitbyplatform/beos/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

[
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/20404/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/20404/13077/joe-kloss-robinhood-11-remote-buffer-overflow/download/",
        "exploit_id": "20404",
        "exploit_description": "\"Joe Kloss RobinHood 1.1 - Remote Buffer Overflow\"",
        "exploit_date": "2000-11-14",
        "exploit_author": "Vort-fu",
        "exploit_type": "remote",
        "exploit_platform": "beos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19841/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19841/8065/be-beos-404550-ip-packet-length-field/download/",
        "exploit_id": "19841",
        "exploit_description": "\"Be BeOS 4.0/4.5/5.0 - IP Packet Length Field\"",
        "exploit_date": "2000-04-07",
        "exploit_author": "\"Tim Newsham\"",
        "exploit_type": "local",
        "exploit_platform": "beos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19840/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19840/8064/be-beos-4550-invalid-system-call/download/",
        "exploit_id": "19840",
        "exploit_description": "\"Be BeOS 4.5/5.0 - Invalid System Call\"",
        "exploit_date": "2000-04-10",
        "exploit_author": "\"Konstantin Boldyshev\"",
        "exploit_type": "local",
        "exploit_platform": "beos",
        "exploit_port": null
    },
    {
        "url": "https://www.nmmapper.com/api/exploitdetails/19938/?format=json",
        "download_file": "https://www.nmmapper.com/st/exploitdetails/19938/2392/beos-50-tcp-fragmentation-remote-denial-of-service/download/",
        "exploit_id": "19938",
        "exploit_description": "\"BeOS 5.0 - TCP Fragmentation Remote Denial of Service\"",
        "exploit_date": "2000-05-18",
        "exploit_author": "visi0n",
        "exploit_type": "dos",
        "exploit_platform": "beos",
        "exploit_port": null
    }
]