ExploitDBSighting


NameExploitDBSighting JSON
Version 0.2.0 PyPI version JSON
download
home_pagehttps://github.com/cedricbonhomme/ExploitDBSighting
SummaryA client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.
upload_time2025-01-21 13:52:54
maintainerNone
docs_urlNone
authorCédric Bonhomme
requires_python<4.0,>=3.10
licenseGPL-3.0-or-later
keywords vulnerability cve sighting observations exploit-db pyvulnerabilitylookup
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # ExploitDBSighting

A client that retrieves vulnerability observations from
[Exploit-DB](https://www.exploit-db.com/) and pushes them to a
[Vulnerability-Lookup](https://github.com/cve-search/vulnerability-lookup) instance.

Exploit-DB.com is a comprehensive and publicly accessible database of security
vulnerabilities and exploits, maintained by Offensive Security. It serves as a
crucial resource for penetration testers, researchers, and ethical hackers by
offering detailed information and proof-of-concept code.

Within the Vulnerability-Lookup project, data from Exploit-DB are leveraged as sightings,
specifically categorized as "exploited" in alignment with the MISP taxonomy of sightings.

More information about the sightings:

- [Corresponding MISP taxonomy](https://github.com/MISP/misp-taxonomies/blob/fd2fbaf2a450e42a490551e5a8e2fa6df039a6b8/vulnerability/machinetag.json#L26-L63)
- [Vulnerability-Lookup documentation](https://vulnerability-lookup.readthedocs.io/en/latest/sightings.html#sightings)

## Installation


[pipx](https://github.com/pypa/pipx) is an easy way to install and run Python applications in isolated environments.
It's easy to [install](https://github.com/pypa/pipx?tab=readme-ov-file#on-linux).


```bash
$ pipx install ExploitDBSighting
$ export ExploitDBSighting_CONFIG=~/conf.py
```

The configuration should be defined in a Python file (e.g., ``~/.conf.py``).
You must then set an environment variable (``ExploitDBSighting_CONFIG``) with the full path to this file.


## Usage

### Publishing sightings to Vulnerability-Lookup

```bash
$ ExploitDBSighting
CVE-2017-14084
https://www.exploit-db.com/exploits/42891
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…

CVE-2017-14085
https://www.exploit-db.com/exploits/42893
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…

CVE-2017-14086
https://www.exploit-db.com/exploits/42892
2017-09-28 00:00:00+00:00
Pushing sighting to Vulnerability-Lookup…
```


## License

[ExploitDBSighting](https://github.com/cedricbonhomme/ExploitDBSighting) is licensed under
[GNU General Public License version 3](https://www.gnu.org/licenses/gpl-3.0.html)

~~~
Copyright (c) 2024-2025 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (C) 2024-2025 Cédric Bonhomme - https://github.com/cedricbonhomme
~~~

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/cedricbonhomme/ExploitDBSighting",
    "name": "ExploitDBSighting",
    "maintainer": null,
    "docs_url": null,
    "requires_python": "<4.0,>=3.10",
    "maintainer_email": null,
    "keywords": "vulnerability, cve, sighting, observations, Exploit-DB, PyVulnerabilityLookup",
    "author": "C\u00e9dric Bonhomme",
    "author_email": "cedric.bonhomme@circl.lu",
    "download_url": "https://files.pythonhosted.org/packages/46/3e/b3902a42386ce300e3ef68a4cde0088f47a5d91b718e241daf4133a2a013/exploitdbsighting-0.2.0.tar.gz",
    "platform": null,
    "description": "# ExploitDBSighting\n\nA client that retrieves vulnerability observations from\n[Exploit-DB](https://www.exploit-db.com/) and pushes them to a\n[Vulnerability-Lookup](https://github.com/cve-search/vulnerability-lookup) instance.\n\nExploit-DB.com is a comprehensive and publicly accessible database of security\nvulnerabilities and exploits, maintained by Offensive Security. It serves as a\ncrucial resource for penetration testers, researchers, and ethical hackers by\noffering detailed information and proof-of-concept code.\n\nWithin the Vulnerability-Lookup project, data from Exploit-DB are leveraged as sightings,\nspecifically categorized as \"exploited\" in alignment with the MISP taxonomy of sightings.\n\nMore information about the sightings:\n\n- [Corresponding MISP taxonomy](https://github.com/MISP/misp-taxonomies/blob/fd2fbaf2a450e42a490551e5a8e2fa6df039a6b8/vulnerability/machinetag.json#L26-L63)\n- [Vulnerability-Lookup documentation](https://vulnerability-lookup.readthedocs.io/en/latest/sightings.html#sightings)\n\n## Installation\n\n\n[pipx](https://github.com/pypa/pipx) is an easy way to install and run Python applications in isolated environments.\nIt's easy to [install](https://github.com/pypa/pipx?tab=readme-ov-file#on-linux).\n\n\n```bash\n$ pipx install ExploitDBSighting\n$ export ExploitDBSighting_CONFIG=~/conf.py\n```\n\nThe configuration should be defined in a Python file (e.g., ``~/.conf.py``).\nYou must then set an environment variable (``ExploitDBSighting_CONFIG``) with the full path to this file.\n\n\n## Usage\n\n### Publishing sightings to Vulnerability-Lookup\n\n```bash\n$ ExploitDBSighting\nCVE-2017-14084\nhttps://www.exploit-db.com/exploits/42891\n2017-09-28 00:00:00+00:00\nPushing sighting to Vulnerability-Lookup\u2026\n\nCVE-2017-14085\nhttps://www.exploit-db.com/exploits/42893\n2017-09-28 00:00:00+00:00\nPushing sighting to Vulnerability-Lookup\u2026\n\nCVE-2017-14086\nhttps://www.exploit-db.com/exploits/42892\n2017-09-28 00:00:00+00:00\nPushing sighting to Vulnerability-Lookup\u2026\n```\n\n\n## License\n\n[ExploitDBSighting](https://github.com/cedricbonhomme/ExploitDBSighting) is licensed under\n[GNU General Public License version 3](https://www.gnu.org/licenses/gpl-3.0.html)\n\n~~~\nCopyright (c) 2024-2025 Computer Incident Response Center Luxembourg (CIRCL)\nCopyright (C) 2024-2025 C\u00e9dric Bonhomme - https://github.com/cedricbonhomme\n~~~\n",
    "bugtrack_url": null,
    "license": "GPL-3.0-or-later",
    "summary": "A client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.",
    "version": "0.2.0",
    "project_urls": {
        "Homepage": "https://github.com/cedricbonhomme/ExploitDBSighting",
        "Repository": "https://github.com/cedricbonhomme/ExploitDBSighting"
    },
    "split_keywords": [
        "vulnerability",
        " cve",
        " sighting",
        " observations",
        " exploit-db",
        " pyvulnerabilitylookup"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "5b2074564fc5d30b04a7f656fb5a6acbddbf2a573d3c64d27b20166f3dd4ef2a",
                "md5": "fcbd85456e4fed5d47dcc49838dab0c4",
                "sha256": "518966fd7babbb227abf48348509bb94eb32b8810be23bfc0bf805afde5f2b77"
            },
            "downloads": -1,
            "filename": "exploitdbsighting-0.2.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "fcbd85456e4fed5d47dcc49838dab0c4",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": "<4.0,>=3.10",
            "size": 17768,
            "upload_time": "2025-01-21T13:52:53",
            "upload_time_iso_8601": "2025-01-21T13:52:53.164936Z",
            "url": "https://files.pythonhosted.org/packages/5b/20/74564fc5d30b04a7f656fb5a6acbddbf2a573d3c64d27b20166f3dd4ef2a/exploitdbsighting-0.2.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "463eb3902a42386ce300e3ef68a4cde0088f47a5d91b718e241daf4133a2a013",
                "md5": "f9afb542266b78d091ec0875a7b71c3e",
                "sha256": "c8361b1baed9e360192d11052dc610e08daed0046355004629f88c573b6c4003"
            },
            "downloads": -1,
            "filename": "exploitdbsighting-0.2.0.tar.gz",
            "has_sig": false,
            "md5_digest": "f9afb542266b78d091ec0875a7b71c3e",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": "<4.0,>=3.10",
            "size": 16667,
            "upload_time": "2025-01-21T13:52:54",
            "upload_time_iso_8601": "2025-01-21T13:52:54.452587Z",
            "url": "https://files.pythonhosted.org/packages/46/3e/b3902a42386ce300e3ef68a4cde0088f47a5d91b718e241daf4133a2a013/exploitdbsighting-0.2.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-01-21 13:52:54",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "cedricbonhomme",
    "github_project": "ExploitDBSighting",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "exploitdbsighting"
}
        
Elapsed time: 2.06848s