Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/andreafioraldi/cve_searchsploit

Search an exploit in the local exploitdb database by its CVE
https://github.com/andreafioraldi/cve_searchsploit

cve cve-edb cve-exploit edb edbid exploit exploit-database exploit-db exploitdb search-exploits searchsploit

Last synced: 1 day ago
JSON representation

Search an exploit in the local exploitdb database by its CVE

Awesome Lists containing this project

README

        

# CVE SearchSploit

> version 1.7

Search an exploit in the local exploitdb database by its CVE.

Here you can get a free cve to exploit-db mapping in json format.

## Install

#### from PyPI

```
$ pip3 install cve_searchsploit
```

#### from GitHub

```
$ git clone https://github.com/andreafioraldi/cve_searchsploit
$ cd cve_searchsploit
$ python3 setup.py install
```

#### Requirements

+ python3
+ requests
+ progressbar2
+ git

## Usage
```
$ cve_searchsploit [parameters...]
```

#### Parameters
+ `````` search exploits by a cve
+ ```-u``` update the cve-edbid mapping
+ ```-f ``` search exploits by a cve list file
+ ```-n ``` search exploits by the cve matching with a nessus scan in csv format

### As a library

```python
>>> import cve_searchsploit as CS
>>>
>>> CS.update_db()
Refreshing exploit-database repo with lastest exploits
From https://github.com/offensive-security/exploit-database
* branch master -> FETCH_HEAD
Already up to date.
Refreshing EDBID-CVE mapping
100% (41823 of 41823) |##############| Elapsed Time: 0:00:00 Time: 0:00:00
>>>
>>> CS.edbid_from_cve("CVE-2019-0708")
[46946, 47120, 47416]
>>> CS.cve_from_edbid(47120)
['CVE-2019-0708']
```

## Cite

If you use this tool in your academic work you can cite it using

```bibtex
@Misc{cve_searchsploit,
author = {Andrea Fioraldi},
howpublished = {GitHub},
month = jun,
title = {{CVE SearchSploit}},
year = {2017},
url = {https://github.com/andreafioraldi/cve_searchsploit},
}
```