# 🛡️ XYZ 0-Day Scanner 🛡️
**From CyberXYZ Security Inc., our research team looks for the next 0-Day vulnerabilities in collaboration with Cork Institute for Technology (CIT).**
[](https://choosealicense.com/licenses/mit/)
## 🚀 Overview
The XYZ 0-Day Scanner is a powerful command-line interface that allows developers and security professionals to scan their projects for known vulnerabilities. It leverages the comprehensive XYZ Vulnerability Database to provide real-time security insights.
## ✨ Features
- **Vulnerability Scanning**: Scan your projects for vulnerabilities using a variety of methods.
- **Package Auditing**: Audit your dependencies for known security issues.
- **Exploit Information**: Get information about known exploits for discovered vulnerabilities.
- **Multi-Ecosystem Support**: Scan projects in various ecosystems, including Python and Go.
## 🛠️ Installation
You can install the XYZ 0-Day Scanner using `pip` or `uv`:
```bash
pip install XYZ-0-Day-Scanner
```
or
```bash
uv pip install XYZ-0-Day-Scanner
```
**Note:** To use the Go auditing features, you will also need to install `depsdev`:
```bash
go install github.com/edoardottt/depsdev/cmd/depsdev@latest
```
## 👨💻 Usage
To get started, you'll need to log in to your CyberXYZ account:
```bash
xyz login
```
Once logged in, you can use the following commands to check your projects for vulnerabilities.
### `info`
Display information about the XYZ Vulnerability API.
```bash
xyz info
```
### `vuln`
Search for a specific vulnerability by ID (e.g., CVE, GHSA).
```bash
xyz vuln CVE-2021-44228
```
**Options:**
* `-x`, `--exploits`: Include exploit information.
* `--affected`: Show affected packages.
* `--json`: Output as JSON.
### `package`
Search for vulnerabilities affecting a specific package.
```bash
xyz package requests -e pypi -v 2.25.1
```
**Options:**
* `-e`, `--ecosystem`: Filter by ecosystem (e.g., npm, pypi, maven).
* `-v`, `--version`: Filter by package version.
* `-s`, `--severity`: Filter by severity (critical, high, medium, low).
* `-x`, `--exploits`: Include exploit information.
* `--limit`: Maximum results to return.
* `--json`: Output as JSON.
### `scan`
Scan installed packages for vulnerabilities.
```bash
xyz scan --python --npm
```
**Options:**
* `--python`: Scan Python packages.
* `--npm`: Scan npm packages.
* `-i`, `--system`: Scan system packages.
* `--java`: Scan Java packages.
* `--go`: Scan Go packages.
* `--php`: Scan PHP packages.
* `--microsoft`: Scan Microsoft packages.
* `--all`: Scan all package types.
* `-x`, `--exploits`: Include exploit information.
* `--json`: Output as JSON.
* `--list-packages`: Only list installed packages, do not scan for vulnerabilities.
### `audit`
Audit local development environments.
#### `python`
Audit Python environment for vulnerabilities and dependency tree.
```bash
xyz audit python
```
**Options:**
* `--json`: Output audit results as JSON.
#### `go`
Audit Go modules.
```bash
xyz audit go
```
**Options:**
* `--json`: Output audit results as JSON.
### `recent`
Show recent vulnerabilities.
```bash
xyz recent --days 7
```
**Options:**
* `--days`: Number of days to look back.
* `--limit`: Maximum results to return.
* `-x`, `--exploits`: Include exploit information.
* `--json`: Output as JSON.
### `stats`
Show database and API statistics.
```bash
xyz stats
```
## 🙏 Credits
This tool was developed by the CyberXYZ Security team.
## 📄 License
The XYZ 0-Day Scanner is licensed under a commercial license. See the [LICENSE](LICENSE) file for more details.
Raw data
{
"_id": null,
"home_page": "https://github.com/cyberxyz-security/XYZ-0-Day-Scanner",
"name": "XYZ-0-Day-Scanner",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": null,
"keywords": "vulnerability scanner, security, CVE, GHSA, OSV",
"author": "CyberXYZ Security Team",
"author_email": "amro@cyberxyz.io",
"download_url": "https://files.pythonhosted.org/packages/53/7a/eaa5a598837081c3b345030c2551c29dd34f9290a30b5dbe3ba3efd3b71b/xyz_0_day_scanner-1.0.1.tar.gz",
"platform": null,
"description": "# \ud83d\udee1\ufe0f XYZ 0-Day Scanner \ud83d\udee1\ufe0f\n\n**From CyberXYZ Security Inc., our research team looks for the next 0-Day vulnerabilities in collaboration with Cork Institute for Technology (CIT).**\n\n[](https://choosealicense.com/licenses/mit/)\n\n## \ud83d\ude80 Overview\n\nThe XYZ 0-Day Scanner is a powerful command-line interface that allows developers and security professionals to scan their projects for known vulnerabilities. It leverages the comprehensive XYZ Vulnerability Database to provide real-time security insights.\n\n## \u2728 Features\n\n- **Vulnerability Scanning**: Scan your projects for vulnerabilities using a variety of methods.\n- **Package Auditing**: Audit your dependencies for known security issues.\n- **Exploit Information**: Get information about known exploits for discovered vulnerabilities.\n- **Multi-Ecosystem Support**: Scan projects in various ecosystems, including Python and Go.\n\n## \ud83d\udee0\ufe0f Installation\n\nYou can install the XYZ 0-Day Scanner using `pip` or `uv`:\n\n```bash\npip install XYZ-0-Day-Scanner\n```\n\nor\n\n```bash\nuv pip install XYZ-0-Day-Scanner\n```\n\n**Note:** To use the Go auditing features, you will also need to install `depsdev`:\n\n```bash\ngo install github.com/edoardottt/depsdev/cmd/depsdev@latest\n```\n\n## \ud83d\udc68\u200d\ud83d\udcbb Usage\n\nTo get started, you'll need to log in to your CyberXYZ account:\n\n```bash\nxyz login\n```\n\nOnce logged in, you can use the following commands to check your projects for vulnerabilities.\n\n### `info`\n\nDisplay information about the XYZ Vulnerability API.\n\n```bash\nxyz info\n```\n\n### `vuln`\n\nSearch for a specific vulnerability by ID (e.g., CVE, GHSA).\n\n```bash\nxyz vuln CVE-2021-44228\n```\n\n**Options:**\n\n* `-x`, `--exploits`: Include exploit information.\n* `--affected`: Show affected packages.\n* `--json`: Output as JSON.\n\n### `package`\n\nSearch for vulnerabilities affecting a specific package.\n\n```bash\nxyz package requests -e pypi -v 2.25.1\n```\n\n**Options:**\n\n* `-e`, `--ecosystem`: Filter by ecosystem (e.g., npm, pypi, maven).\n* `-v`, `--version`: Filter by package version.\n* `-s`, `--severity`: Filter by severity (critical, high, medium, low).\n* `-x`, `--exploits`: Include exploit information.\n* `--limit`: Maximum results to return.\n* `--json`: Output as JSON.\n\n### `scan`\n\nScan installed packages for vulnerabilities.\n\n```bash\nxyz scan --python --npm\n```\n\n**Options:**\n\n* `--python`: Scan Python packages.\n* `--npm`: Scan npm packages.\n* `-i`, `--system`: Scan system packages.\n* `--java`: Scan Java packages.\n* `--go`: Scan Go packages.\n* `--php`: Scan PHP packages.\n* `--microsoft`: Scan Microsoft packages.\n* `--all`: Scan all package types.\n* `-x`, `--exploits`: Include exploit information.\n* `--json`: Output as JSON.\n* `--list-packages`: Only list installed packages, do not scan for vulnerabilities.\n\n### `audit`\n\nAudit local development environments.\n\n#### `python`\n\nAudit Python environment for vulnerabilities and dependency tree.\n\n```bash\nxyz audit python\n```\n\n**Options:**\n\n* `--json`: Output audit results as JSON.\n\n#### `go`\n\nAudit Go modules.\n\n```bash\nxyz audit go\n```\n\n**Options:**\n\n* `--json`: Output audit results as JSON.\n\n### `recent`\n\nShow recent vulnerabilities.\n\n```bash\nxyz recent --days 7\n```\n\n**Options:**\n\n* `--days`: Number of days to look back.\n* `--limit`: Maximum results to return.\n* `-x`, `--exploits`: Include exploit information.\n* `--json`: Output as JSON.\n\n### `stats`\n\nShow database and API statistics.\n\n```bash\nxyz stats\n```\n\n## \ud83d\ude4f Credits\n\nThis tool was developed by the CyberXYZ Security team.\n\n## \ud83d\udcc4 License\n\nThe XYZ 0-Day Scanner is licensed under a commercial license. See the [LICENSE](LICENSE) file for more details.\n",
"bugtrack_url": null,
"license": null,
"summary": "From CyberXYZ Security Inc., our research team looks for the next 0-Day vulnerabilities in collaboration with Cork Institute for Technology (CIT).",
"version": "1.0.1",
"project_urls": {
"Bug Reports": "https://github.com/cyberxyz-security/XYZ-0-Day-Scanner/issues",
"Documentation": "https://github.com/cyberxyz-security/XYZ-0-Day-Scanner",
"Homepage": "https://github.com/cyberxyz-security/XYZ-0-Day-Scanner",
"Source": "https://github.com/cyberxyz-security/XYZ-0-Day-Scanner"
},
"split_keywords": [
"vulnerability scanner",
" security",
" cve",
" ghsa",
" osv"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "e4fd306998654726f4ce9952f7ef3c89c0c82fe579e619d003912e4c3f99c0fc",
"md5": "3fb5cc77f9e49c463001015ddae54ae1",
"sha256": "2426b90f052cd549869d30fed40fa4e77af49c6ef7d395c07d25a6adffab0885"
},
"downloads": -1,
"filename": "xyz_0_day_scanner-1.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "3fb5cc77f9e49c463001015ddae54ae1",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 15563,
"upload_time": "2025-07-14T21:42:09",
"upload_time_iso_8601": "2025-07-14T21:42:09.577735Z",
"url": "https://files.pythonhosted.org/packages/e4/fd/306998654726f4ce9952f7ef3c89c0c82fe579e619d003912e4c3f99c0fc/xyz_0_day_scanner-1.0.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "537aeaa5a598837081c3b345030c2551c29dd34f9290a30b5dbe3ba3efd3b71b",
"md5": "b754b90a61d68f450928877ee86410f5",
"sha256": "6e0b03a6cc2d0d78c19f8f2844167d3819bc00bb031b3a15602c5772927c656a"
},
"downloads": -1,
"filename": "xyz_0_day_scanner-1.0.1.tar.gz",
"has_sig": false,
"md5_digest": "b754b90a61d68f450928877ee86410f5",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 14750,
"upload_time": "2025-07-14T21:42:12",
"upload_time_iso_8601": "2025-07-14T21:42:12.262744Z",
"url": "https://files.pythonhosted.org/packages/53/7a/eaa5a598837081c3b345030c2551c29dd34f9290a30b5dbe3ba3efd3b71b/xyz_0_day_scanner-1.0.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-14 21:42:12",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "cyberxyz-security",
"github_project": "XYZ-0-Day-Scanner",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [
{
"name": "click",
"specs": []
},
{
"name": "requests",
"specs": []
},
{
"name": "python-dotenv",
"specs": []
},
{
"name": "tabulate",
"specs": []
},
{
"name": "rich",
"specs": []
},
{
"name": "pip-audit",
"specs": []
}
],
"lcname": "xyz-0-day-scanner"
}