# ExploitDBSighting
A client that retrieves vulnerability observations from
[Exploit-DB](https://www.exploit-db.com/) and pushes them to a
[Vulnerability-Lookup](https://github.com/cve-search/vulnerability-lookup) instance.
Exploit-DB.com is a comprehensive and publicly accessible database of security
vulnerabilities and exploits, maintained by Offensive Security. It serves as a
crucial resource for penetration testers, researchers, and ethical hackers by
offering detailed information and proof-of-concept code.
Within the Vulnerability-Lookup project, data from Exploit-DB are leveraged as sightings,
specifically categorized as "exploited" in alignment with the MISP taxonomy of sightings.
More information about the sightings:
- [Corresponding MISP taxonomy](https://github.com/MISP/misp-taxonomies/blob/fd2fbaf2a450e42a490551e5a8e2fa6df039a6b8/vulnerability/machinetag.json#L26-L63)
- [Vulnerability-Lookup documentation](https://vulnerability-lookup.readthedocs.io/en/latest/sightings.html#sightings)
## Installation
[pipx](https://github.com/pypa/pipx) is an easy way to install and run Python applications in isolated environments.
It's easy to [install](https://github.com/pypa/pipx?tab=readme-ov-file#on-linux).
```bash
$ pipx install ExploitDBSighting
$ export ExploitDBSighting_CONFIG=~/conf.py
```
The configuration should be defined in a Python file (e.g., ``~/.conf.py``).
You must then set an environment variable (``ExploitDBSighting_CONFIG``) with the full path to this file.
## Usage
### Publishing sightings to Vulnerability-Lookup
```bash
$ ExploitDBSighting
CVE-2017-14084
https://www.exploit-db.com/exploits/42891
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…
CVE-2017-14085
https://www.exploit-db.com/exploits/42893
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…
CVE-2017-14086
https://www.exploit-db.com/exploits/42892
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…
```
## License
[ExploitDBSighting](https://github.com/cedricbonhomme/ExploitDBSighting) is licensed under
[GNU General Public License version 3](https://www.gnu.org/licenses/gpl-3.0.html)
~~~
Copyright (c) 2024-2025 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (C) 2024-2025 Cédric Bonhomme - https://github.com/cedricbonhomme
~~~
Raw data
{
"_id": null,
"home_page": "https://github.com/cedricbonhomme/ExploitDBSighting",
"name": "ExploitDBSighting",
"maintainer": null,
"docs_url": null,
"requires_python": "<4.0,>=3.10",
"maintainer_email": null,
"keywords": "vulnerability, cve, sighting, observations, Exploit-DB, PyVulnerabilityLookup",
"author": "C\u00e9dric Bonhomme",
"author_email": "cedric.bonhomme@circl.lu",
"download_url": "https://files.pythonhosted.org/packages/46/3e/b3902a42386ce300e3ef68a4cde0088f47a5d91b718e241daf4133a2a013/exploitdbsighting-0.2.0.tar.gz",
"platform": null,
"description": "# ExploitDBSighting\n\nA client that retrieves vulnerability observations from\n[Exploit-DB](https://www.exploit-db.com/) and pushes them to a\n[Vulnerability-Lookup](https://github.com/cve-search/vulnerability-lookup) instance.\n\nExploit-DB.com is a comprehensive and publicly accessible database of security\nvulnerabilities and exploits, maintained by Offensive Security. It serves as a\ncrucial resource for penetration testers, researchers, and ethical hackers by\noffering detailed information and proof-of-concept code.\n\nWithin the Vulnerability-Lookup project, data from Exploit-DB are leveraged as sightings,\nspecifically categorized as \"exploited\" in alignment with the MISP taxonomy of sightings.\n\nMore information about the sightings:\n\n- [Corresponding MISP taxonomy](https://github.com/MISP/misp-taxonomies/blob/fd2fbaf2a450e42a490551e5a8e2fa6df039a6b8/vulnerability/machinetag.json#L26-L63)\n- [Vulnerability-Lookup documentation](https://vulnerability-lookup.readthedocs.io/en/latest/sightings.html#sightings)\n\n## Installation\n\n\n[pipx](https://github.com/pypa/pipx) is an easy way to install and run Python applications in isolated environments.\nIt's easy to [install](https://github.com/pypa/pipx?tab=readme-ov-file#on-linux).\n\n\n```bash\n$ pipx install ExploitDBSighting\n$ export ExploitDBSighting_CONFIG=~/conf.py\n```\n\nThe configuration should be defined in a Python file (e.g., ``~/.conf.py``).\nYou must then set an environment variable (``ExploitDBSighting_CONFIG``) with the full path to this file.\n\n\n## Usage\n\n### Publishing sightings to Vulnerability-Lookup\n\n```bash\n$ ExploitDBSighting\nCVE-2017-14084\nhttps://www.exploit-db.com/exploits/42891\n2017-09-28 00:00:00+00:00\nPushing sighting to Vulnerability-Lookup\u2026\n\nCVE-2017-14085\nhttps://www.exploit-db.com/exploits/42893\n2017-09-28 00:00:00+00:00\nPushing sighting to Vulnerability-Lookup\u2026\n\nCVE-2017-14086\nhttps://www.exploit-db.com/exploits/42892\n2017-09-28 00:00:00+00:00\nPushing sighting to Vulnerability-Lookup\u2026\n```\n\n\n## License\n\n[ExploitDBSighting](https://github.com/cedricbonhomme/ExploitDBSighting) is licensed under\n[GNU General Public License version 3](https://www.gnu.org/licenses/gpl-3.0.html)\n\n~~~\nCopyright (c) 2024-2025 Computer Incident Response Center Luxembourg (CIRCL)\nCopyright (C) 2024-2025 C\u00e9dric Bonhomme - https://github.com/cedricbonhomme\n~~~\n",
"bugtrack_url": null,
"license": "GPL-3.0-or-later",
"summary": "A client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.",
"version": "0.2.0",
"project_urls": {
"Homepage": "https://github.com/cedricbonhomme/ExploitDBSighting",
"Repository": "https://github.com/cedricbonhomme/ExploitDBSighting"
},
"split_keywords": [
"vulnerability",
" cve",
" sighting",
" observations",
" exploit-db",
" pyvulnerabilitylookup"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "5b2074564fc5d30b04a7f656fb5a6acbddbf2a573d3c64d27b20166f3dd4ef2a",
"md5": "fcbd85456e4fed5d47dcc49838dab0c4",
"sha256": "518966fd7babbb227abf48348509bb94eb32b8810be23bfc0bf805afde5f2b77"
},
"downloads": -1,
"filename": "exploitdbsighting-0.2.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "fcbd85456e4fed5d47dcc49838dab0c4",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": "<4.0,>=3.10",
"size": 17768,
"upload_time": "2025-01-21T13:52:53",
"upload_time_iso_8601": "2025-01-21T13:52:53.164936Z",
"url": "https://files.pythonhosted.org/packages/5b/20/74564fc5d30b04a7f656fb5a6acbddbf2a573d3c64d27b20166f3dd4ef2a/exploitdbsighting-0.2.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "463eb3902a42386ce300e3ef68a4cde0088f47a5d91b718e241daf4133a2a013",
"md5": "f9afb542266b78d091ec0875a7b71c3e",
"sha256": "c8361b1baed9e360192d11052dc610e08daed0046355004629f88c573b6c4003"
},
"downloads": -1,
"filename": "exploitdbsighting-0.2.0.tar.gz",
"has_sig": false,
"md5_digest": "f9afb542266b78d091ec0875a7b71c3e",
"packagetype": "sdist",
"python_version": "source",
"requires_python": "<4.0,>=3.10",
"size": 16667,
"upload_time": "2025-01-21T13:52:54",
"upload_time_iso_8601": "2025-01-21T13:52:54.452587Z",
"url": "https://files.pythonhosted.org/packages/46/3e/b3902a42386ce300e3ef68a4cde0088f47a5d91b718e241daf4133a2a013/exploitdbsighting-0.2.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-01-21 13:52:54",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "cedricbonhomme",
"github_project": "ExploitDBSighting",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "exploitdbsighting"
}