cve_searchsploit
cve_searchsploit copied to clipboard
Search an exploit in the local exploitdb database by its CVE
CVE SearchSploit
version 1.6
Search an exploit in the local exploitdb database by its CVE.
Here you can get a free cve to exploit-db mapping in json format.
Install
from PyPI
$ pip3 install cve_searchsploit
from GitHub
$ git clone https://github.com/andreafioraldi/cve_searchsploit
$ cd cve_searchsploit
$ python3 setup.py install
Requirements
- python3
- requests
- progressbar2
- git
Usage
$ cve_searchsploit [parameters...]
Parameters
-
<cve>
search exploits by a cve -
-u
update the cve-edbid mapping -
-f <file with cve list>
search exploits by a cve list file -
-n <nessus csv scan file>
search exploits by the cve matching with a nessus scan in csv format
As a library
>>> import cve_searchsploit as CS
>>>
>>> CS.update_db()
Refreshing exploit-database repo with lastest exploits
From https://github.com/offensive-security/exploit-database
* branch master -> FETCH_HEAD
Already up to date.
Refreshing EDBID-CVE mapping
100% (41823 of 41823) |##############| Elapsed Time: 0:00:00 Time: 0:00:00
>>>
>>> CS.edbid_from_cve("CVE-2019-0708")
[46946, 47120, 47416]
>>> CS.cve_from_edbid(47120)
['CVE-2019-0708']
Cite
If you use this tool in your academic work you can cite it using
@Misc{cve_searchsploit,
author = {Andrea Fioraldi},
howpublished = {GitHub},
month = jun,
title = {{CVE SearchSploit}},
year = {2017},
url = {https://github.com/andreafioraldi/cve_searchsploit},
}