# cve_searchsploit **Repository Path**: fanych/cve_searchsploit ## Basic Information - **Project Name**: cve_searchsploit - **Description**: No description available - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-04-20 - **Last Updated**: 2021-11-02 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # CVE SearchSploit > version 1.6 Search an exploit in the local exploitdb database by its CVE. Here you can get a free cve to exploit-db mapping in json format. ## Install #### from PyPI ``` $ pip3 install cve_searchsploit ``` #### from GitHub ``` $ git clone https://github.com/andreafioraldi/cve_searchsploit $ cd cve_searchsploit $ python3 setup.py install ``` #### Requirements + python3 + requests + progressbar2 + git ## Usage ``` $ cve_searchsploit [parameters...] ``` #### Parameters + `````` search exploits by a cve + ```-u``` update the cve-edbid mapping + ```-f ``` search exploits by a cve list file + ```-n ``` search exploits by the cve matching with a nessus scan in csv format ### As a library ```python >>> import cve_searchsploit as CS >>> >>> CS.update_db() Refreshing exploit-database repo with lastest exploits From https://github.com/offensive-security/exploit-database * branch master -> FETCH_HEAD Already up to date. Refreshing EDBID-CVE mapping 100% (41823 of 41823) |##############| Elapsed Time: 0:00:00 Time: 0:00:00 >>> >>> CS.edbid_from_cve("CVE-2019-0708") [46946, 47120, 47416] >>> CS.cve_from_edbid(47120) ['CVE-2019-0708'] ``` ## Cite If you use this tool in your academic work you can cite it using ```bibtex @Misc{cve_searchsploit, author = {Andrea Fioraldi}, howpublished = {GitHub}, month = jun, title = {{CVE SearchSploit}}, year = {2017}, url = {https://github.com/andreafioraldi/cve_searchsploit}, } ```