Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/joshbressers/cve-analysis
Tools for conducting analysis of CVE data in Elasticsearch
https://github.com/joshbressers/cve-analysis
Last synced: about 2 months ago
JSON representation
Tools for conducting analysis of CVE data in Elasticsearch
- Host: GitHub
- URL: https://github.com/joshbressers/cve-analysis
- Owner: joshbressers
- License: gpl-3.0
- Created: 2017-06-03T01:38:57.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-05-04T05:53:15.000Z (over 1 year ago)
- Last Synced: 2023-05-04T06:29:59.119Z (over 1 year ago)
- Language: Python
- Size: 61.5 KB
- Stars: 66
- Watchers: 8
- Forks: 27
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - joshbressers/cve-analysis - Tools for conducting analysis of CVE data in Elasticsearch (Python)
README
# cve-analysis
Tools for conducting analysis of CVE data in Elasticsearch## Slow Start
Download Elasticsearch and Kibana from elastic.coStart them (basically ./bin/elasticsearch and ./bin/kibana from the
respective directories).Run `get-nvd-json.sh` to download the CVE data from NVD
Run `json-parse.py nvd-out.json` to import the CVE data into ElasticsearchYou rerun the above commands to update your data whenever needed.
The script honors two environment variables
ESURL which should be your Elasticsearch URL. For example```
export ESURL='https://username:password@somehost:9200'
```And the ESCERT which you should point at the ca.crt generated by
Elasticsearch if TLS is enabled (which it is in 8.0 and above)```
export ESCERT=/some/path/certs/ca/ca.crt
```