cve_searchsploit
                                
                                 cve_searchsploit copied to clipboard
                                
                                    cve_searchsploit copied to clipboard
                            
                            
                            
                        Search an exploit in the local exploitdb database by its CVE
CVE SearchSploit
version 1.6
Search an exploit in the local exploitdb database by its CVE.
Here you can get a free cve to exploit-db mapping in json format.
Install
from PyPI
$ pip3 install cve_searchsploit
from GitHub
$ git clone https://github.com/andreafioraldi/cve_searchsploit
$ cd cve_searchsploit
$ python3 setup.py install
Requirements
- python3
- requests
- progressbar2
- git
Usage
$ cve_searchsploit [parameters...]
Parameters
- <cve>search exploits by a cve
- -uupdate the cve-edbid mapping
- -f <file with cve list>search exploits by a cve list file
- -n <nessus csv scan file>search exploits by the cve matching with a nessus scan in csv format
As a library
>>> import cve_searchsploit as CS
>>> 
>>> CS.update_db()
Refreshing exploit-database repo with lastest exploits
From https://github.com/offensive-security/exploit-database
 * branch                master     -> FETCH_HEAD
Already up to date.
Refreshing EDBID-CVE mapping
100% (41823 of 41823) |##############| Elapsed Time: 0:00:00 Time:  0:00:00
>>> 
>>> CS.edbid_from_cve("CVE-2019-0708")
[46946, 47120, 47416]
>>> CS.cve_from_edbid(47120)
['CVE-2019-0708']
Cite
If you use this tool in your academic work you can cite it using
@Misc{cve_searchsploit,
  author       = {Andrea Fioraldi},
  howpublished = {GitHub},
  month        = jun,
  title        = {{CVE SearchSploit}},
  year         = {2017},
  url          = {https://github.com/andreafioraldi/cve_searchsploit},
}