getsploit
=========
Command line search and download tool for Vulners Database inspired by
searchsploit. It allows you to search online for the exploits across all the
most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The
most powerful feature is immediate exploit source download right in your
working path.
Raw data
{
"_id": null,
"home_page": "https://github.com/vulnersCom/getsploit",
"name": "getsploit",
"maintainer": "Kir Ermakov",
"docs_url": null,
"requires_python": "",
"maintainer_email": "",
"keywords": "",
"author": "Kirill Ermakov",
"author_email": "isox@vulners.com",
"download_url": "https://files.pythonhosted.org/packages/0b/2f/ef1aa656732b0bdad82a02371b1f7bd89dc70eab9382d76c92c37c5bd0c6/getsploit-1.0.0.tar.gz",
"platform": null,
"description": "\ngetsploit\n=========\n\nCommand line search and download tool for Vulners Database inspired by\nsearchsploit. It allows you to search online for the exploits across all the\nmost popular collections: Exploit-DB, Metasploit, Packetstorm and others. The\nmost powerful feature is immediate exploit source download right in your\nworking path.\n",
"bugtrack_url": null,
"license": "LGPLv3",
"summary": "Command line search and download tool for Vulners Database inspired by searchsploit.",
"version": "1.0.0",
"project_urls": {
"Homepage": "https://github.com/vulnersCom/getsploit"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "2cfe1028f588f24e327146ddc6555c8ac910e52abfd77f4af5e54a30b4267ecf",
"md5": "d5330554970cee774a1bdee765463b06",
"sha256": "bda5788bf3ef5447ebc46c576cbbc43be0469933822918cb3ccaedd7354c31dd"
},
"downloads": -1,
"filename": "getsploit-1.0.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "d5330554970cee774a1bdee765463b06",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 8509,
"upload_time": "2024-01-26T21:06:40",
"upload_time_iso_8601": "2024-01-26T21:06:40.450891Z",
"url": "https://files.pythonhosted.org/packages/2c/fe/1028f588f24e327146ddc6555c8ac910e52abfd77f4af5e54a30b4267ecf/getsploit-1.0.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "0b2fef1aa656732b0bdad82a02371b1f7bd89dc70eab9382d76c92c37c5bd0c6",
"md5": "4f5bf0c159dd3fc41bfbdc9c8948aa68",
"sha256": "7c15d2e93bb1af70e9ade4ebf97e9c937a2ee31239d1e319b59f586c342aa659"
},
"downloads": -1,
"filename": "getsploit-1.0.0.tar.gz",
"has_sig": false,
"md5_digest": "4f5bf0c159dd3fc41bfbdc9c8948aa68",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 9118,
"upload_time": "2024-01-26T21:06:41",
"upload_time_iso_8601": "2024-01-26T21:06:41.967462Z",
"url": "https://files.pythonhosted.org/packages/0b/2f/ef1aa656732b0bdad82a02371b1f7bd89dc70eab9382d76c92c37c5bd0c6/getsploit-1.0.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-01-26 21:06:41",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "vulnersCom",
"github_project": "getsploit",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "getsploit"
}