Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/vulnerability-lookup/exploitdbsighting
A client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.
https://github.com/vulnerability-lookup/exploitdbsighting
exploit observations sightings vulnerability vulnerability-lookup
Last synced: 3 days ago
JSON representation
A client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.
- Host: GitHub
- URL: https://github.com/vulnerability-lookup/exploitdbsighting
- Owner: vulnerability-lookup
- License: gpl-3.0
- Created: 2024-11-21T09:24:54.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2025-01-24T13:39:42.000Z (11 days ago)
- Last Synced: 2025-01-24T14:31:56.016Z (11 days ago)
- Topics: exploit, observations, sightings, vulnerability, vulnerability-lookup
- Language: Python
- Homepage: https://pypi.org/project/ExploitDBSighting
- Size: 76.2 KB
- Stars: 0
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: COPYING
Awesome Lists containing this project
README
# ExploitDBSighting
A client that retrieves vulnerability observations from
[Exploit-DB](https://www.exploit-db.com/) and pushes them to a
[Vulnerability-Lookup](https://github.com/cve-search/vulnerability-lookup) instance.Exploit-DB.com is a comprehensive and publicly accessible database of security
vulnerabilities and exploits, maintained by Offensive Security. It serves as a
crucial resource for penetration testers, researchers, and ethical hackers by
offering detailed information and proof-of-concept code.Within the Vulnerability-Lookup project, data from Exploit-DB are leveraged as sightings,
specifically categorized as "exploited" in alignment with the MISP taxonomy of sightings.More information about the sightings:
- [Corresponding MISP taxonomy](https://github.com/MISP/misp-taxonomies/blob/fd2fbaf2a450e42a490551e5a8e2fa6df039a6b8/vulnerability/machinetag.json#L26-L63)
- [Vulnerability-Lookup documentation](https://vulnerability-lookup.readthedocs.io/en/latest/sightings.html#sightings)## Installation
[pipx](https://github.com/pypa/pipx) is an easy way to install and run Python applications in isolated environments.
It's easy to [install](https://github.com/pypa/pipx?tab=readme-ov-file#on-linux).```bash
$ pipx install ExploitDBSighting
$ export ExploitDBSighting_CONFIG=~/conf.py
```The configuration should be defined in a Python file (e.g., ``~/.conf.py``).
You must then set an environment variable (``ExploitDBSighting_CONFIG``) with the full path to this file.## Usage
### Publishing sightings to Vulnerability-Lookup
```bash
$ ExploitDBSighting
CVE-2017-14084
https://www.exploit-db.com/exploits/42891
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…CVE-2017-14085
https://www.exploit-db.com/exploits/42893
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…CVE-2017-14086
https://www.exploit-db.com/exploits/42892
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…
```## License
[ExploitDBSighting](https://github.com/vulnerability-lookup/ExploitDBSighting) is licensed under
[GNU General Public License version 3](https://www.gnu.org/licenses/gpl-3.0.html)~~~
Copyright (c) 2024-2025 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (C) 2024-2025 Cédric Bonhomme - https://github.com/cedricbonhomme
~~~