{"id":17219331,"url":"https://github.com/andreafioraldi/cve_searchsploit","last_synced_at":"2025-04-06T09:07:50.645Z","repository":{"id":22889824,"uuid":"95290157","full_name":"andreafioraldi/cve_searchsploit","owner":"andreafioraldi","description":"Search an exploit in the local exploitdb database by its CVE","archived":false,"fork":false,"pushed_at":"2022-11-16T10:16:40.000Z","size":1986,"stargazers_count":171,"open_issues_count":2,"forks_count":49,"subscribers_count":10,"default_branch":"master","last_synced_at":"2025-03-30T08:11:15.074Z","etag":null,"topics":["cve","cve-edb","cve-exploit","edb","edbid","exploit","exploit-database","exploit-db","exploitdb","search-exploits","searchsploit"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/andreafioraldi.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2017-06-24T10:10:40.000Z","updated_at":"2025-03-25T20:29:26.000Z","dependencies_parsed_at":"2022-07-20T07:32:03.743Z","dependency_job_id":null,"html_url":"https://github.com/andreafioraldi/cve_searchsploit","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/andreafioraldi%2Fcve_searchsploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/andreafioraldi%2Fcve_searchsploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/andreafioraldi%2Fcve_searchsploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/andreafioraldi%2Fcve_searchsploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/andreafioraldi","download_url":"https://codeload.github.com/andreafioraldi/cve_searchsploit/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247457801,"owners_count":20941906,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve","cve-edb","cve-exploit","edb","edbid","exploit","exploit-database","exploit-db","exploitdb","search-exploits","searchsploit"],"created_at":"2024-10-15T03:49:38.797Z","updated_at":"2025-04-06T09:07:50.620Z","avatar_url":"https://github.com/andreafioraldi.png","language":"Python","readme":"# CVE SearchSploit\n\n\u003e version 1.7\n\nSearch an exploit in the local exploitdb database by its CVE.\n\nHere you can get a free cve to exploit-db mapping in json format.\n\n## Install\n\n#### from PyPI\n\n```\n$ pip3 install cve_searchsploit\n```\n\n#### from GitHub\n\n```\n$ git clone https://github.com/andreafioraldi/cve_searchsploit\n$ cd cve_searchsploit\n$ python3 setup.py install\n```\n\n#### Requirements\n\n+ python3\n+ requests\n+ progressbar2\n+ git\n\n## Usage\n```\n$ cve_searchsploit [parameters...]\n```\n\n#### Parameters\n+  ```\u003ccve\u003e```                      search exploits by a cve\n+  ```-u```                         update the cve-edbid mapping\n+  ```-f \u003cfile with cve list\u003e```    search exploits by a cve list file\n+  ```-n \u003cnessus csv scan file\u003e```  search exploits by the cve matching with a nessus scan in csv format\n\n### As a library\n\n```python\n\u003e\u003e\u003e import cve_searchsploit as CS\n\u003e\u003e\u003e \n\u003e\u003e\u003e CS.update_db()\nRefreshing exploit-database repo with lastest exploits\nFrom https://github.com/offensive-security/exploit-database\n * branch                master     -\u003e FETCH_HEAD\nAlready up to date.\nRefreshing EDBID-CVE mapping\n100% (41823 of 41823) |##############| Elapsed Time: 0:00:00 Time:  0:00:00\n\u003e\u003e\u003e \n\u003e\u003e\u003e CS.edbid_from_cve(\"CVE-2019-0708\")\n[46946, 47120, 47416]\n\u003e\u003e\u003e CS.cve_from_edbid(47120)\n['CVE-2019-0708']\n```\n\n## Cite\n\nIf you use this tool in your academic work you can cite it using\n\n```bibtex\n@Misc{cve_searchsploit,\n  author       = {Andrea Fioraldi},\n  howpublished = {GitHub},\n  month        = jun,\n  title        = {{CVE SearchSploit}},\n  year         = {2017},\n  url          = {https://github.com/andreafioraldi/cve_searchsploit},\n}\n```\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fandreafioraldi%2Fcve_searchsploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fandreafioraldi%2Fcve_searchsploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fandreafioraldi%2Fcve_searchsploit/lists"}