{"id":17101920,"url":"https://github.com/nullarray/pyparser-cve","last_synced_at":"2025-08-14T19:15:18.067Z","repository":{"id":140848052,"uuid":"101587105","full_name":"NullArray/PyParser-CVE","owner":"NullArray","description":"Multi source CVE/exploit parser.","archived":false,"fork":false,"pushed_at":"2017-08-30T08:26:16.000Z","size":24,"stargazers_count":27,"open_issues_count":1,"forks_count":22,"subscribers_count":3,"default_branch":"master","last_synced_at":"2025-04-13T00:36:23.557Z","etag":null,"topics":["cve","infosec","osint","parser","penetration-testing","pentest","pentest-tool","vulnerabilities"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/NullArray.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2017-08-27T23:42:00.000Z","updated_at":"2024-08-12T19:32:14.000Z","dependencies_parsed_at":null,"dependency_job_id":"ae5fbe9f-3b5b-47aa-8fa7-249a8c5618bc","html_url":"https://github.com/NullArray/PyParser-CVE","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/NullArray/PyParser-CVE","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FPyParser-CVE","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FPyParser-CVE/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FPyParser-CVE/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FPyParser-CVE/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/NullArray","download_url":"https://codeload.github.com/NullArray/PyParser-CVE/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FPyParser-CVE/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":267754852,"owners_count":24139435,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-07-29T02:00:12.549Z","response_time":2574,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve","infosec","osint","parser","penetration-testing","pentest","pentest-tool","vulnerabilities"],"created_at":"2024-10-14T15:27:25.784Z","updated_at":"2025-07-29T20:34:54.583Z","avatar_url":"https://github.com/NullArray.png","language":"Python","readme":"# PyParser\n\nPyParser is a vulnerability parser that looks for CVE's from different sources. It employs the Shodan API, has the ability to retrieve and process data from [CVE Mitre](https://cve.mitre.org/) and comes with functionality to install and use Offensive Security's ExploitDB [Searchsploit](https://github.com/offensive-security/exploit-database/blob/master/searchsploit) utility.\n\n## Usage\n\nStart the program from the command line with `python cveparser.py`. Once the program has been started it will prompt for your Shodan.io API key. Once provided it will prompt to install Searchsploit, which is optional. After these operations a menu will be displayed the options for which are as follows.\n\n```\n1. Query Shodan\t\t\t\t4. Logging\t\n2. Query CVE Mitre\t\t\t5. Quit\n3. Invoke Searchsploit\t\t\t\t\n```\nSelect a number to select a data source to use when searching for a particular vulnerability. The 'logging' option will save results of your search queries in the current working directory as an application log from PyParser.\n\n## Dependencies\nPyParser depends on the following Python 2.7 libraries.\n```\nblessings\nshodan\npycurl\n```\nShould you find you do not have any of these libraries installed you can use Python's built in package manager to resolve it like so: \n```\npip install blessings\npip install shodan\npip install pycurl\n```\nAlternatively, feel free to use the requirements file i have made for this project like so `pip install -r requirements.txt`.\n\n### Note\n\nThis is a BETA release, as such there might be some bugs. If you happen to encounter a bug please feel free to [open a ticket](https://github.com/NullArray/PyParser/issues) or [submit a pull request](https://github.com/NullArray/PyParser/pulls)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnullarray%2Fpyparser-cve","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fnullarray%2Fpyparser-cve","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnullarray%2Fpyparser-cve/lists"}