scandb


Namescandb JSON
Version 1.1.0 PyPI version JSON
download
home_pagehttps://bitbucket.org/cbless/scandb
SummaryScripts to import nmap and nessus scan results into a SQLite database, analyze the overall results and generate reports or target lists.
upload_time2023-09-02 22:26:51
maintainer
docs_urlNone
authorChristoph Bless
requires_python
licenseGPLv3
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            This tool provides some scripts to import *Nmap* and *Nessus* scan results into a sqlite database.
The imported results can then be analyzed by various tool to generate target list for other tools, generate csv files and DOCX reports (
based on DOCX templates). The following console commands are available after installation:

| cli command | description |
| ----------- | ----------- |
| scandb-importer | Import *nmap* and *nessus* scans into a sqlite database | 
| scandb-services | Generate ip address lists based on port filters (e.g. as input for other tools) | 
| scandb-vulns | Search and generate ip address lists based on vulnerability filters (e.g. search for severity, cve, plugin-id, plugin output) | 
| scandb-statistics | Print scan, port, vulnerability statistics or generate CSV files with these statistics. Can also be used to generate a CSV file with a list of open ports per host. | 
| scandb-compare | Compare to scandb instances and generate CSV statistics with differences. (Due to database changes that might happen these instances should be generated with the same *scandb* version) | 
| scandb-report | Generate DOCX Reports based on given templates.| 

## License
This script is licensed under the GNU General Public License in version 3. See http://www.gnu.org/licenses/ for further details.

## Installation
The tool has been published to pypi and can be installed via *pip*.

```
pip install scandb
```

## scandb-importer
This command can be used do import a single file or many files at once to a sqlite database.
You can use the parameters *--file* and *--dir* to specify the files that should be imported.

```
$  scandb-importer -h     
usage: scandb-importer [-h] [--db DB] [--file [FILE [FILE ...]]] [--dir DIR]

I will import Nmap and Nessus scans into a SQLite database.

optional arguments:
  -h, --help            show this help message and exit
  --db DB
  --file [FILE [FILE ...]]
                        The nessus and/or nmap file(s)
  --dir DIR             Directory name with nessus and/or nmap files

```


## scandb-services
This command can be used to generate target lists based on port filters.

```
$ scandb-services -h
usage: scandb-services [-h] [--db DB] [--status STATUS] [-t PORTS] [-u PORTS] [-o UNION|INTERSECTION] [--list] [-d LIST_DELIMITER] [--list-file FILE]

I can be used to generate target lists (ip address lists) that can be used as input for other tools based on given filters.

optional arguments:
  -h, --help            show this help message and exit
  --db DB
  --status STATUS       Status string stored in database (default: up)
  -t PORTS, --tcp PORTS
                        Open TCP ports
  -u PORTS, --udp PORTS
                        Open UDP ports
  -o UNION|INTERSECTION, --operation UNION|INTERSECTION
                        Operation to combine the sets of TCP and UDP ports (default: UNION)
  --list                Generate a target list
  -d LIST_DELIMITER, --list-delimiter LIST_DELIMITER
                        Delimiter used to separate hosts in the list output
  --list-file FILE      Generate a file with the targets instead of printing them to stdout

```

Generate a list of all hosts (with status 'up'):
```
$ scandb-services --list
192.168.1.2
192.168.1.1
192.168.1.11
192.168.1.19
```

Generate a list of all hosts (with status 'up') and use the delimiter "," instead of a new line:
```
$ scandb-services --list -d ","
192.168.1.2,192.168.1.1,192.168.1.11,192.168.1.19
```

Generate a list of hosts with open tcp port 80:
```
$ scandb-services --list -d " " -t 80
192.168.1.2 192.168.1.1
```

Generate a list of hosts with open udp port 53:
```
$ scandb-services --list -d " " -u 53
192.168.1.19 192.168.1.1
```


Generate a list of hosts with open tcp port 80 or udp port 53:
```
$ scandb-services --list -d " " -u 53 -t 80
192.168.1.19 192.168.1.2 192.168.1.1
```

Generate a list of hosts with open tcp port 80 and udp port 53:
```
$ scandb-services --list -d " " -u 53 -t 80 -o intersection
192.168.1.1
```




## scandb-statistics
This command can be used to display statistics or to create a csv file with all IP addresses and their open ports.
```
$  scandb-statistics -h
usage: scandb-statistics [-h] [--db DB] [-s] [-v] [-p] [--host-portlist] [-d DELIMITER] [-o OUTFILE] [-w] [--docx] [--template TEMPLATE]

I can generate statistics about vulnerabilities, open ports or for the imported scans. Furthermore I can generate a host/portlist as csv file. All statistics can be displayed on stdout or they can be written to csv or docx files (based on templates). See
https://bitbucket.org/cbless/scandb/src/master/examples/ for example templates.A description of usable objects and their attributes can be found under: https://bitbucket.org/cbless/scandb/wiki/Report-Templates

optional arguments:
  -h, --help            show this help message and exit
  --db DB
  -s, --scan-statistics
                        Print statistics for each scan
  -v, --vuln-statistics
                        Print number of vulns foreach host.
  -p, --port-statistics
                        Print number of 'open' TCP and UDP ports foreach host.
  --host-portlist       generate a csv with a list of TCP and UDP Ports per host
  -d DELIMITER, --delimiter DELIMITER
                        Delimiter for CSV files.
  -o OUTFILE, --outfile OUTFILE
                        Prefix for output files.
  -w, --write-file      Write data to CSV file. Prefix of filename can be changed with parameter outfile
  --docx                Render the given DOCX template for the selected statistics. Prefix of filename can be changed with parameter '--outfile'. The template can be specified with parameter '--template'
  --template TEMPLATE   Name of the template to render. Examples can be found under: https://bitbucket.org/cbless/scandb/src/master/examples/
```

To generate a list of open TCP and UDP ports you can use the following command:
```
$  scandb-statistics --host-portlist
Results written to : scandb-hostportlist.csv
```

The content of the file scandb-hostportlist.csv will looks like this.
```
192.168.1.1;53;udp
192.168.1.1;53,80,443,5060,8181;tcp
192.168.1.19;161;udp
192.168.1.2;53,80,5060,8089;tcp
```


## scandb-vulns
This command can be used to generate target lists based on vulnerability filters.
```
$    scandb-vulns -h        
usage: scandb-vulns [-h] [--db DB] [--min-severity MIN_SEVERITY] [--filter-by {cve,plugin-id,plugin-name,plugin-output,description,ip}] [--search SEARCH-Term] [--list {ips,details}] [-d LIST_DELIMITER] [--list-file FILE]

I can be used to query the sqlite database to filter specific vulnerabilities. Results can be displayed to stdout or written to a csv file.

optional arguments:
  -h, --help            show this help message and exit
  --db DB
  --min-severity MIN_SEVERITY
                        Minimum severity level (default: 0)
  --filter-by {cve,plugin-id,plugin-name,plugin-output,description,ip}
                        Filter hosts by the given filter. The search value is specified with option --search. The following fields can be used as filter 'cve', 'plugin-id', 'plugin-name', 'description', 'ip'. (Note: The option 'ip' returns just the ip itself, when '
                        --list ips' is selected and a vulnerability was detected for that ip, otherwise the result is empty.)
  --search SEARCH-Term  Search term used for querying the database. The type of the search field can be selected with the parameter --filter-by
  --list {ips,details}  Generate a target list of ip addresses when selecting 'ips' or display the columns Address,Port,Protocol,Severity,Plugin-ID,Plugin-Name
  -d LIST_DELIMITER, --list-delimiter LIST_DELIMITER
                        Delimiter used to separate hosts in the list output. Only when --list ips is used.
  --list-file FILE      Generate a file with the results instead of printing them to stdout. Incase of '--list ips' is selected the file contains a list of ip address (one per line), in case of '--list details' it will be a csv file
```

Select hosts that are affected by a cve starting with CVE-2015- and display only the ip address. 
```
scandb-vulns --filter-by cve --search CVE-2015- --list ips
```

Select hosts that are affected by a vulnerability with Plugin-ID 48243 and display the columns Address,Port,Protocol,Severity,Plugin-ID,Plugin-Name. 
```
 scandb-vulns --db test.sqlite --filter-by plugin-id --search 48243 --list details
             Address           Port       Protocol       Severity      Plugin-IDPlugin-Name
      192.168.100.101            443            tcp              0          48243PHP Version Detection
      192.168.100.111             80            tcp              0          48243PHP Version Detection
      192.168.100.122            443            tcp              0          48243PHP Version Detection
```

## scandb-compare
This command can be used to compare two scandb database instances (databases must be created with scandb v0.4.0 or 
a later version). 
```
$   scandb-compare -h
usage: scandb-compare [-h] [--db1 DB1] [--db2 DB2] [-v] [-p] [--host-portlist] [-o OUTFILE]

optional arguments:
  -h, --help            show this help message and exit
  --db1 DB1
  --db2 DB2
  -v, --vuln-statistics
                        Print number of vulns foreach host and db.
  -p, --port-statistics
                        Print number of 'open' TCP and UDP ports foreach host and db.
  --host-portlist       generate a csv with a list of TCP and UDP Ports per host and db
  -o OUTFILE, --outfile OUTFILE
                        Prefix for output files.

```

## scandb-report
This command can be used to export vulnerabilities to a docx format based on custom templates. 

See also:  

- [DOCX template examples]( https://bitbucket.org/cbless/scandb/src/master/examples/ ) 
- [Description of Report Objects]( https://bitbucket.org/cbless/scandb/wiki/Report-Templates ) 



```
$     scandb-report -h       
usage: scandb-report [-h] [--db DB] [--min-severity MIN_SEVERITY] [--plugins PLUGINS [PLUGINS ...]] [--export-vulns {all,unsorted,host,plugin}] [--template TEMPLATE] [--outfile OUTFILE]

Generate DOCX reports based on custom templates. See https://bitbucket.org/cbless/scandb/src/master/examples/ for example templates.A description of usable objects and their attributes can be found under: https://bitbucket.org/cbless/scandb/wiki/Report-Templates

optional arguments:
  -h, --help            show this help message and exit
  --db DB
  --min-severity MIN_SEVERITY
                        Minimum severity level (default: 0). Either plugins or min-severity can be used.
  --plugins PLUGINS [PLUGINS ...]
                        List of plugins to export. Either plugins or min-severity can be used.
  --export-vulns {all,unsorted,host,plugin}
                        Can be used to specifiy how the vulnerabilities will be injected into the template. 'unsorted' means that the vulnerabilites will be available unsorted as 'vulns'. 'host' means that a list of vulnerabilities is avaialable per host. 'plugin'
                        means that the list of affected systems is available per plugin/vulnerability as 'vulns_by_plugin'. 'all' means that all three options are available in the template. (default 'plugin')
  --template TEMPLATE   Name of the template to render. Examples can be found under: https://bitbucket.org/cbless/scandb/src/master/examples/
  --outfile OUTFILE     Name that is used for the generated report.

```

**Example:** Export only vulnerabilities with a minimum severity of MEDIUM. 
```
scandb-report --min-severity 2  --db scandb.sqlite --template "examples/vulns-by-plugin_with_stats.docx"
```

**Example:** Export only a list of vulnerabilities that match the specified plugin IDs. 
```
scandb-report --plugins 12344,44443,22211  --db scandb.sqlite --template "examples/vulns-by-plugin_with_stats.docx"
```

            

Raw data

            {
    "_id": null,
    "home_page": "https://bitbucket.org/cbless/scandb",
    "name": "scandb",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "",
    "author": "Christoph Bless",
    "author_email": "bitbucket@cbless.de",
    "download_url": "https://files.pythonhosted.org/packages/ba/0d/6b698c05fd703499c2fb45e82375564121145159d50b39f0b28c654cb3e6/scandb-1.1.0.tar.gz",
    "platform": null,
    "description": "This tool provides some scripts to import *Nmap* and *Nessus* scan results into a sqlite database.\nThe imported results can then be analyzed by various tool to generate target list for other tools, generate csv files and DOCX reports (\nbased on DOCX templates). The following console commands are available after installation:\n\n| cli command | description |\n| ----------- | ----------- |\n| scandb-importer | Import *nmap* and *nessus* scans into a sqlite database | \n| scandb-services | Generate ip address lists based on port filters (e.g. as input for other tools) | \n| scandb-vulns | Search and generate ip address lists based on vulnerability filters (e.g. search for severity, cve, plugin-id, plugin output) | \n| scandb-statistics | Print scan, port, vulnerability statistics or generate CSV files with these statistics. Can also be used to generate a CSV file with a list of open ports per host. | \n| scandb-compare | Compare to scandb instances and generate CSV statistics with differences. (Due to database changes that might happen these instances should be generated with the same *scandb* version) | \n| scandb-report | Generate DOCX Reports based on given templates.| \n\n## License\nThis script is licensed under the GNU General Public License in version 3. See http://www.gnu.org/licenses/ for further details.\n\n## Installation\nThe tool has been published to pypi and can be installed via *pip*.\n\n```\npip install scandb\n```\n\n## scandb-importer\nThis command can be used do import a single file or many files at once to a sqlite database.\nYou can use the parameters *--file* and *--dir* to specify the files that should be imported.\n\n```\n$  scandb-importer -h     \nusage: scandb-importer [-h] [--db DB] [--file [FILE [FILE ...]]] [--dir DIR]\n\nI will import Nmap and Nessus scans into a SQLite database.\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --db DB\n  --file [FILE [FILE ...]]\n                        The nessus and/or nmap file(s)\n  --dir DIR             Directory name with nessus and/or nmap files\n\n```\n\n\n## scandb-services\nThis command can be used to generate target lists based on port filters.\n\n```\n$ scandb-services -h\nusage: scandb-services [-h] [--db DB] [--status STATUS] [-t PORTS] [-u PORTS] [-o UNION|INTERSECTION] [--list] [-d LIST_DELIMITER] [--list-file FILE]\n\nI can be used to generate target lists (ip address lists) that can be used as input for other tools based on given filters.\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --db DB\n  --status STATUS       Status string stored in database (default: up)\n  -t PORTS, --tcp PORTS\n                        Open TCP ports\n  -u PORTS, --udp PORTS\n                        Open UDP ports\n  -o UNION|INTERSECTION, --operation UNION|INTERSECTION\n                        Operation to combine the sets of TCP and UDP ports (default: UNION)\n  --list                Generate a target list\n  -d LIST_DELIMITER, --list-delimiter LIST_DELIMITER\n                        Delimiter used to separate hosts in the list output\n  --list-file FILE      Generate a file with the targets instead of printing them to stdout\n\n```\n\nGenerate a list of all hosts (with status 'up'):\n```\n$ scandb-services --list\n192.168.1.2\n192.168.1.1\n192.168.1.11\n192.168.1.19\n```\n\nGenerate a list of all hosts (with status 'up') and use the delimiter \",\" instead of a new line:\n```\n$ scandb-services --list -d \",\"\n192.168.1.2,192.168.1.1,192.168.1.11,192.168.1.19\n```\n\nGenerate a list of hosts with open tcp port 80:\n```\n$ scandb-services --list -d \" \" -t 80\n192.168.1.2 192.168.1.1\n```\n\nGenerate a list of hosts with open udp port 53:\n```\n$ scandb-services --list -d \" \" -u 53\n192.168.1.19 192.168.1.1\n```\n\n\nGenerate a list of hosts with open tcp port 80 or udp port 53:\n```\n$ scandb-services --list -d \" \" -u 53 -t 80\n192.168.1.19 192.168.1.2 192.168.1.1\n```\n\nGenerate a list of hosts with open tcp port 80 and udp port 53:\n```\n$ scandb-services --list -d \" \" -u 53 -t 80 -o intersection\n192.168.1.1\n```\n\n\n\n\n## scandb-statistics\nThis command can be used to display statistics or to create a csv file with all IP addresses and their open ports.\n```\n$  scandb-statistics -h\nusage: scandb-statistics [-h] [--db DB] [-s] [-v] [-p] [--host-portlist] [-d DELIMITER] [-o OUTFILE] [-w] [--docx] [--template TEMPLATE]\n\nI can generate statistics about vulnerabilities, open ports or for the imported scans. Furthermore I can generate a host/portlist as csv file. All statistics can be displayed on stdout or they can be written to csv or docx files (based on templates). See\nhttps://bitbucket.org/cbless/scandb/src/master/examples/ for example templates.A description of usable objects and their attributes can be found under: https://bitbucket.org/cbless/scandb/wiki/Report-Templates\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --db DB\n  -s, --scan-statistics\n                        Print statistics for each scan\n  -v, --vuln-statistics\n                        Print number of vulns foreach host.\n  -p, --port-statistics\n                        Print number of 'open' TCP and UDP ports foreach host.\n  --host-portlist       generate a csv with a list of TCP and UDP Ports per host\n  -d DELIMITER, --delimiter DELIMITER\n                        Delimiter for CSV files.\n  -o OUTFILE, --outfile OUTFILE\n                        Prefix for output files.\n  -w, --write-file      Write data to CSV file. Prefix of filename can be changed with parameter outfile\n  --docx                Render the given DOCX template for the selected statistics. Prefix of filename can be changed with parameter '--outfile'. The template can be specified with parameter '--template'\n  --template TEMPLATE   Name of the template to render. Examples can be found under: https://bitbucket.org/cbless/scandb/src/master/examples/\n```\n\nTo generate a list of open TCP and UDP ports you can use the following command:\n```\n$  scandb-statistics --host-portlist\nResults written to : scandb-hostportlist.csv\n```\n\nThe content of the file scandb-hostportlist.csv will looks like this.\n```\n192.168.1.1;53;udp\n192.168.1.1;53,80,443,5060,8181;tcp\n192.168.1.19;161;udp\n192.168.1.2;53,80,5060,8089;tcp\n```\n\n\n## scandb-vulns\nThis command can be used to generate target lists based on vulnerability filters.\n```\n$    scandb-vulns -h        \nusage: scandb-vulns [-h] [--db DB] [--min-severity MIN_SEVERITY] [--filter-by {cve,plugin-id,plugin-name,plugin-output,description,ip}] [--search SEARCH-Term] [--list {ips,details}] [-d LIST_DELIMITER] [--list-file FILE]\n\nI can be used to query the sqlite database to filter specific vulnerabilities. Results can be displayed to stdout or written to a csv file.\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --db DB\n  --min-severity MIN_SEVERITY\n                        Minimum severity level (default: 0)\n  --filter-by {cve,plugin-id,plugin-name,plugin-output,description,ip}\n                        Filter hosts by the given filter. The search value is specified with option --search. The following fields can be used as filter 'cve', 'plugin-id', 'plugin-name', 'description', 'ip'. (Note: The option 'ip' returns just the ip itself, when '\n                        --list ips' is selected and a vulnerability was detected for that ip, otherwise the result is empty.)\n  --search SEARCH-Term  Search term used for querying the database. The type of the search field can be selected with the parameter --filter-by\n  --list {ips,details}  Generate a target list of ip addresses when selecting 'ips' or display the columns Address,Port,Protocol,Severity,Plugin-ID,Plugin-Name\n  -d LIST_DELIMITER, --list-delimiter LIST_DELIMITER\n                        Delimiter used to separate hosts in the list output. Only when --list ips is used.\n  --list-file FILE      Generate a file with the results instead of printing them to stdout. Incase of '--list ips' is selected the file contains a list of ip address (one per line), in case of '--list details' it will be a csv file\n```\n\nSelect hosts that are affected by a cve starting with CVE-2015- and display only the ip address. \n```\nscandb-vulns --filter-by cve --search CVE-2015- --list ips\n```\n\nSelect hosts that are affected by a vulnerability with Plugin-ID 48243 and display the columns Address,Port,Protocol,Severity,Plugin-ID,Plugin-Name. \n```\n scandb-vulns --db test.sqlite --filter-by plugin-id --search 48243 --list details\n             Address           Port       Protocol       Severity      Plugin-IDPlugin-Name\n      192.168.100.101            443            tcp              0          48243PHP Version Detection\n      192.168.100.111             80            tcp              0          48243PHP Version Detection\n      192.168.100.122            443            tcp              0          48243PHP Version Detection\n```\n\n## scandb-compare\nThis command can be used to compare two scandb database instances (databases must be created with scandb v0.4.0 or \na later version). \n```\n$   scandb-compare -h\nusage: scandb-compare [-h] [--db1 DB1] [--db2 DB2] [-v] [-p] [--host-portlist] [-o OUTFILE]\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --db1 DB1\n  --db2 DB2\n  -v, --vuln-statistics\n                        Print number of vulns foreach host and db.\n  -p, --port-statistics\n                        Print number of 'open' TCP and UDP ports foreach host and db.\n  --host-portlist       generate a csv with a list of TCP and UDP Ports per host and db\n  -o OUTFILE, --outfile OUTFILE\n                        Prefix for output files.\n\n```\n\n## scandb-report\nThis command can be used to export vulnerabilities to a docx format based on custom templates. \n\nSee also:  \n\n- [DOCX template examples]( https://bitbucket.org/cbless/scandb/src/master/examples/ ) \n- [Description of Report Objects]( https://bitbucket.org/cbless/scandb/wiki/Report-Templates ) \n\n\n\n```\n$     scandb-report -h       \nusage: scandb-report [-h] [--db DB] [--min-severity MIN_SEVERITY] [--plugins PLUGINS [PLUGINS ...]] [--export-vulns {all,unsorted,host,plugin}] [--template TEMPLATE] [--outfile OUTFILE]\n\nGenerate DOCX reports based on custom templates. See https://bitbucket.org/cbless/scandb/src/master/examples/ for example templates.A description of usable objects and their attributes can be found under: https://bitbucket.org/cbless/scandb/wiki/Report-Templates\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --db DB\n  --min-severity MIN_SEVERITY\n                        Minimum severity level (default: 0). Either plugins or min-severity can be used.\n  --plugins PLUGINS [PLUGINS ...]\n                        List of plugins to export. Either plugins or min-severity can be used.\n  --export-vulns {all,unsorted,host,plugin}\n                        Can be used to specifiy how the vulnerabilities will be injected into the template. 'unsorted' means that the vulnerabilites will be available unsorted as 'vulns'. 'host' means that a list of vulnerabilities is avaialable per host. 'plugin'\n                        means that the list of affected systems is available per plugin/vulnerability as 'vulns_by_plugin'. 'all' means that all three options are available in the template. (default 'plugin')\n  --template TEMPLATE   Name of the template to render. Examples can be found under: https://bitbucket.org/cbless/scandb/src/master/examples/\n  --outfile OUTFILE     Name that is used for the generated report.\n\n```\n\n**Example:** Export only vulnerabilities with a minimum severity of MEDIUM. \n```\nscandb-report --min-severity 2  --db scandb.sqlite --template \"examples/vulns-by-plugin_with_stats.docx\"\n```\n\n**Example:** Export only a list of vulnerabilities that match the specified plugin IDs. \n```\nscandb-report --plugins 12344,44443,22211  --db scandb.sqlite --template \"examples/vulns-by-plugin_with_stats.docx\"\n```\n",
    "bugtrack_url": null,
    "license": "GPLv3",
    "summary": "Scripts to import nmap and nessus scan results into a SQLite database, analyze the overall results and generate reports or target lists.",
    "version": "1.1.0",
    "project_urls": {
        "Homepage": "https://bitbucket.org/cbless/scandb"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "8a66e9ef1e98f1e022c4192a189a8cc24217fe532c74f45c587c2453520c6017",
                "md5": "8b7e5a516ce3c8f0686df85debd76460",
                "sha256": "a9389239a87bd064d5139070c149e8382ac048fdb303f3ee683390671f86e20b"
            },
            "downloads": -1,
            "filename": "scandb-1.1.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "8b7e5a516ce3c8f0686df85debd76460",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 28517,
            "upload_time": "2023-09-02T22:26:49",
            "upload_time_iso_8601": "2023-09-02T22:26:49.973940Z",
            "url": "https://files.pythonhosted.org/packages/8a/66/e9ef1e98f1e022c4192a189a8cc24217fe532c74f45c587c2453520c6017/scandb-1.1.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "ba0d6b698c05fd703499c2fb45e82375564121145159d50b39f0b28c654cb3e6",
                "md5": "eb8bd0a380ecb99c6efe5a1c7318c377",
                "sha256": "c8be93132615e19bdc0892c2a3c8df0c4e81ea02b8e3f7635e6a2f1bde13af2f"
            },
            "downloads": -1,
            "filename": "scandb-1.1.0.tar.gz",
            "has_sig": false,
            "md5_digest": "eb8bd0a380ecb99c6efe5a1c7318c377",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 25638,
            "upload_time": "2023-09-02T22:26:51",
            "upload_time_iso_8601": "2023-09-02T22:26:51.241554Z",
            "url": "https://files.pythonhosted.org/packages/ba/0d/6b698c05fd703499c2fb45e82375564121145159d50b39f0b28c654cb3e6/scandb-1.1.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-09-02 22:26:51",
    "github": false,
    "gitlab": false,
    "bitbucket": true,
    "codeberg": false,
    "bitbucket_user": "cbless",
    "bitbucket_project": "scandb",
    "lcname": "scandb"
}
        
Elapsed time: 0.11193s