If I understand you want to analyze an exploit, right ?
Here you will find an updated database and the deobfuscated code : exploit-db.com
Actually it is not easy to explain how to make an exploit analysis.
The ideal solution is to simulate the attack and the information must be obtained through some tests. The simulation use the open source distribution BackBox Linux, an operating system dedicated to penetration testing.
Then you must make a Port Scanning using Nmap, free software able to detect open ports and network services available on the target system, or even on a range of IP addresses.
And much more ....