# Vulnerability Analyzer - Advanced Vulnerability Analysis Library
**Comprehensive Security Intelligence Platform**
Vulnerability Analyzer is an advanced vulnerability analysis library featuring comprehensive security intelligence from multiple authoritative sources. The library provides extensive vulnerability assessment capabilities with an integrated database containing over 55,000 vulnerabilities.
**Core Capabilities:**
- **Comprehensive Vulnerability Database** with 55,712 unique vulnerabilities
- **Multi-Source Intelligence Integration** - CVE, ExploitDB, NVD, RouterSploit
- **Advanced Security Assessment** with pattern-based threat detection
- **High-Performance Architecture** with optimized in-memory database
- **Extensive Threat Analysis** and comprehensive security intelligence
Vulnerability Analyzer delivers comprehensive vulnerability assessment capabilities through integration with authoritative security databases including CVE, ExploitDB, NVD, and RouterSploit. The library features high-performance architecture designed for advanced security analysis and vulnerability management.
## Installation
### Version Support
Python 3.8+ is supported. Works on Windows, Linux, and macOS.
### Install from PyPI
```bash
pip install vulnerability-analyzer
```
### Install from Source
```bash
git clone https://github.com/D14b0l1c/vulnerability-analyzer.git
cd vulnerability-analyzer
pip install -e .
```
### Package vs Module Names
- **PyPI Package Name:** `vulnerability-analyzer` (for pip install)
- **Python Import Name:** `vulnerability_analyzer` (for import statements)
```python
# Install with pip
pip install vulnerability-analyzer
# Import in Python
import vulnerability_analyzer
```
## Quick Start
### Basic Vulnerability Assessment
```python
import vulnerability_analyzer
# Initialize the analysis engine
analyzer = vulnerability_analyzer.VulnerabilityAnalyzer()
# Define target services for assessment
services = [
{'port': 80, 'service': 'http', 'version': '2.4.29', 'banner': 'Apache/2.4.29'},
{'port': 22, 'service': 'ssh', 'version': '7.4', 'banner': 'OpenSSH_7.4'},
{'port': 443, 'service': 'https', 'version': '1.14.2', 'banner': 'nginx/1.14.2'}
]
# Perform comprehensive vulnerability analysis
results = analyzer.analyze_service_vulnerabilities('192.168.1.100', services)
# Review assessment results
print(f"Services analyzed: {results['services_analyzed']}")
print(f"Vulnerabilities identified: {len(results['vulnerabilities_found'])}")
print(f"Security risk score: {results['risk_score']:.2f}")
# Display vulnerability details
for vulnerability in results['vulnerabilities_found']:
print(f"- {vulnerability['title']} (Severity: {vulnerability['severity']})")
```
## Key Features
### Comprehensive Vulnerability Intelligence
- **55,712 Vulnerability Entries**: Complete database with multi-source integration
- **ExploitDB Integration**: 46,453 exploit signatures for comprehensive threat analysis
- **NVD Coverage**: 9,191 National Vulnerability Database entries
- **RouterSploit Modules**: 68 specialized router and IoT security assessments
- **Vulnerability Matching**: Match network signatures against known vulnerabilities
- **Report Generation**: Create detailed security assessment reports
- **Modular Design**: Import only the components you need
## API Documentation
### Core Modules
#### `vulnerability_analyzer.VulnerabilityDatabase`
```python
from vulnerability_analyzer import VulnerabilityDatabase
# Initialize database
db = VulnerabilityDatabase()
# Load vulnerability data
cves = db.load_cves()
exploits = db.load_exploits()
routersploit_data = db.load_routersploit()
# Search vulnerabilities
results = db.search("CVE-2021-44228")
router_vulns = db.search_by_category("router")
```
#### `vulnerability_analyzer.PcapAnalyzer`
```python
from vulnerability_analyzer import PcapAnalyzer
analyzer = PcapAnalyzer()
# Analyze PCAP file
results = analyzer.analyze("capture.pcap")
# Extract specific protocol data
http_data = analyzer.extract_http("capture.pcap")
dns_data = analyzer.extract_dns("capture.pcap")
# Apply vulnerability filters
router_traffic = analyzer.filter_router_traffic(results)
suspicious_patterns = analyzer.detect_suspicious_patterns(results)
```
#### `vulnerability_analyzer.NmapAnalyzer`
```python
from vulnerability_analyzer import NmapAnalyzer
analyzer = NmapAnalyzer()
# Parse Nmap XML
scan_results = analyzer.parse_xml("nmap_scan.xml")
# Extract service information
services = analyzer.extract_services(scan_results)
# Identify potential vulnerabilities
vulnerabilities = analyzer.identify_vulnerabilities(services)
```
#### `vulnerability_analyzer.VulnerabilityMatcher`
```python
from vulnerability_analyzer import VulnerabilityMatcher, VulnerabilityDatabase
db = VulnerabilityDatabase()
matcher = VulnerabilityMatcher(db)
# Match network data against vulnerabilities
pcap_matches = matcher.match_pcap_data(pcap_results)
nmap_matches = matcher.match_nmap_data(nmap_results)
# Get detailed match information
for match in pcap_matches:
print(f"CVE: {match.cve_id}")
print(f"Severity: {match.severity}")
print(f"Description: {match.description}")
```
## Library Structure
```
vulnerability_analyzer/
├── __init__.py # Main library interface
├── core/ # Core functionality
│ ├── database.py # Vulnerability database management
│ ├── pcap_analyzer.py # PCAP analysis tools
│ ├── nmap_analyzer.py # Nmap XML parsing
│ └── matcher.py # Vulnerability matching engine
├── data/ # Data management
│ ├── nvd.py # NVD API integration
│ ├── exploitdb.py # ExploitDB data handling
│ └── routersploit.py # RouterSploit data integration
├── utils/ # Utility functions
│ ├── filters.py # Traffic and data filters
│ ├── reports.py # Report generation
│ └── helpers.py # Helper functions
└── examples/ # Usage examples
├── basic_analysis.py
├── pcap_scanning.py
└── vulnerability_research.py
```
## Examples
### Basic Vulnerability Analysis
```python
import vulnerability_analyzer
# Initialize
db = vulnerability_analyzer.VulnerabilityDatabase()
analyzer = vulnerability_analyzer.PcapAnalyzer()
# Analyze network traffic
traffic_data = analyzer.analyze("network.pcap")
# Find vulnerabilities
matcher = vulnerability_analyzer.VulnerabilityMatcher(db)
vulnerabilities = matcher.match_traffic(traffic_data)
# Generate report
report = vulnerability_analyzer.generate_report(vulnerabilities, format="json")
```
### Router Vulnerability Assessment
```python
import vulnerability_analyzer
# Load router-specific vulnerability data
db = vulnerability_analyzer.VulnerabilityDatabase()
router_cves = db.search_by_category("router")
# Analyze router traffic
analyzer = vulnerability_analyzer.PcapAnalyzer()
router_traffic = analyzer.filter_router_traffic("capture.pcap")
# Match against router vulnerabilities
matcher = vulnerability_analyzer.VulnerabilityMatcher(db)
router_vulns = matcher.match_router_signatures(router_traffic)
```
### Integration with Existing Tools
```python
# Use with pandas for data analysis
import pandas as pd
import vulnerability_analyzer
db = vulnerability_analyzer.VulnerabilityDatabase()
cves_df = pd.DataFrame(db.load_cves())
# Filter high-severity CVEs
critical_cves = cves_df[cves_df['severity'] == 'CRITICAL']
# Use with requests for API integration
import requests
import pysploit
# Fetch live vulnerability feeds
nvd_updater = pysploit.NVDUpdater()
latest_cves = nvd_updater.fetch_recent_cves(days=7)
```
## Data Sources
- **National Vulnerability Database (NVD)**: https://services.nvd.nist.gov/rest/json/cves/2.0
- **ExploitDB**: https://gitlab.com/exploit-database/exploitdb
- **RouterSploit Framework**: https://github.com/threat9/routersploit
## Package Information
### Naming Convention
- **PyPI Package:** `vulnerability-analyzer` (used for installation)
- **Python Module:** `pysploit` (used for imports)
- **GitHub Repository:** `vulnerability-analyzer`
### Why Two Names?
The package was originally developed as "PySploit" but the name was already taken on PyPI. Rather than changing all the internal Python module names and breaking existing code, we chose to:
- Keep the Python module name as `pysploit` (for backward compatibility)
- Use `vulnerability-analyzer` as the PyPI package name (for distribution)
This follows common Python packaging practices where the distribution name can differ from the import name.
## License
MIT License - see LICENSE file for details.
## Contributing
1. Fork the repository
2. Create a feature branch
3. Add tests for new functionality
4. Submit a pull request
Raw data
{
"_id": null,
"home_page": null,
"name": "vulnerability-analyzer",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": null,
"keywords": "vulnerability, security, cve, pcap, nmap, penetration-testing, security-assessment, network-analysis",
"author": "D14b0l1c",
"author_email": null,
"download_url": "https://files.pythonhosted.org/packages/09/e2/04357c5c05bbb2d0b4ea45965ee1da2dabcc0a8bd5e1107bc7ff8c519de9/vulnerability_analyzer-1.2.0.tar.gz",
"platform": null,
"description": "# Vulnerability Analyzer - Advanced Vulnerability Analysis Library\r\n\r\n**Comprehensive Security Intelligence Platform**\r\n\r\nVulnerability Analyzer is an advanced vulnerability analysis library featuring comprehensive security intelligence from multiple authoritative sources. The library provides extensive vulnerability assessment capabilities with an integrated database containing over 55,000 vulnerabilities.\r\n\r\n**Core Capabilities:**\r\n- **Comprehensive Vulnerability Database** with 55,712 unique vulnerabilities\r\n- **Multi-Source Intelligence Integration** - CVE, ExploitDB, NVD, RouterSploit \r\n- **Advanced Security Assessment** with pattern-based threat detection\r\n- **High-Performance Architecture** with optimized in-memory database\r\n- **Extensive Threat Analysis** and comprehensive security intelligence\r\n\r\nVulnerability Analyzer delivers comprehensive vulnerability assessment capabilities through integration with authoritative security databases including CVE, ExploitDB, NVD, and RouterSploit. The library features high-performance architecture designed for advanced security analysis and vulnerability management.\r\n\r\n## Installation\r\n\r\n### Version Support\r\nPython 3.8+ is supported. Works on Windows, Linux, and macOS.\r\n\r\n### Install from PyPI\r\n```bash\r\npip install vulnerability-analyzer\r\n```\r\n\r\n### Install from Source\r\n```bash\r\ngit clone https://github.com/D14b0l1c/vulnerability-analyzer.git\r\ncd vulnerability-analyzer\r\npip install -e .\r\n```\r\n\r\n### Package vs Module Names\r\n- **PyPI Package Name:** `vulnerability-analyzer` (for pip install)\r\n- **Python Import Name:** `vulnerability_analyzer` (for import statements)\r\n\r\n```python\r\n# Install with pip\r\npip install vulnerability-analyzer\r\n\r\n# Import in Python\r\nimport vulnerability_analyzer\r\n```\r\n\r\n## Quick Start\r\n\r\n### Basic Vulnerability Assessment\r\n\r\n```python\r\nimport vulnerability_analyzer\r\n\r\n# Initialize the analysis engine\r\nanalyzer = vulnerability_analyzer.VulnerabilityAnalyzer()\r\n\r\n# Define target services for assessment\r\nservices = [\r\n {'port': 80, 'service': 'http', 'version': '2.4.29', 'banner': 'Apache/2.4.29'},\r\n {'port': 22, 'service': 'ssh', 'version': '7.4', 'banner': 'OpenSSH_7.4'},\r\n {'port': 443, 'service': 'https', 'version': '1.14.2', 'banner': 'nginx/1.14.2'}\r\n]\r\n\r\n# Perform comprehensive vulnerability analysis\r\nresults = analyzer.analyze_service_vulnerabilities('192.168.1.100', services)\r\n\r\n# Review assessment results\r\nprint(f\"Services analyzed: {results['services_analyzed']}\")\r\nprint(f\"Vulnerabilities identified: {len(results['vulnerabilities_found'])}\")\r\nprint(f\"Security risk score: {results['risk_score']:.2f}\")\r\n\r\n# Display vulnerability details\r\nfor vulnerability in results['vulnerabilities_found']:\r\n print(f\"- {vulnerability['title']} (Severity: {vulnerability['severity']})\")\r\n```\r\n\r\n## Key Features\r\n\r\n### Comprehensive Vulnerability Intelligence\r\n- **55,712 Vulnerability Entries**: Complete database with multi-source integration\r\n- **ExploitDB Integration**: 46,453 exploit signatures for comprehensive threat analysis\r\n- **NVD Coverage**: 9,191 National Vulnerability Database entries\r\n- **RouterSploit Modules**: 68 specialized router and IoT security assessments\r\n- **Vulnerability Matching**: Match network signatures against known vulnerabilities\r\n- **Report Generation**: Create detailed security assessment reports\r\n- **Modular Design**: Import only the components you need\r\n\r\n## API Documentation\r\n\r\n### Core Modules\r\n\r\n#### `vulnerability_analyzer.VulnerabilityDatabase`\r\n```python\r\nfrom vulnerability_analyzer import VulnerabilityDatabase\r\n\r\n# Initialize database\r\ndb = VulnerabilityDatabase()\r\n\r\n# Load vulnerability data\r\ncves = db.load_cves()\r\nexploits = db.load_exploits()\r\nroutersploit_data = db.load_routersploit()\r\n\r\n# Search vulnerabilities\r\nresults = db.search(\"CVE-2021-44228\")\r\nrouter_vulns = db.search_by_category(\"router\")\r\n```\r\n\r\n#### `vulnerability_analyzer.PcapAnalyzer`\r\n```python\r\nfrom vulnerability_analyzer import PcapAnalyzer\r\n\r\nanalyzer = PcapAnalyzer()\r\n\r\n# Analyze PCAP file\r\nresults = analyzer.analyze(\"capture.pcap\")\r\n\r\n# Extract specific protocol data\r\nhttp_data = analyzer.extract_http(\"capture.pcap\")\r\ndns_data = analyzer.extract_dns(\"capture.pcap\")\r\n\r\n# Apply vulnerability filters\r\nrouter_traffic = analyzer.filter_router_traffic(results)\r\nsuspicious_patterns = analyzer.detect_suspicious_patterns(results)\r\n```\r\n\r\n#### `vulnerability_analyzer.NmapAnalyzer`\r\n```python\r\nfrom vulnerability_analyzer import NmapAnalyzer\r\n\r\nanalyzer = NmapAnalyzer()\r\n\r\n# Parse Nmap XML\r\nscan_results = analyzer.parse_xml(\"nmap_scan.xml\")\r\n\r\n# Extract service information\r\nservices = analyzer.extract_services(scan_results)\r\n\r\n# Identify potential vulnerabilities\r\nvulnerabilities = analyzer.identify_vulnerabilities(services)\r\n```\r\n\r\n#### `vulnerability_analyzer.VulnerabilityMatcher`\r\n```python\r\nfrom vulnerability_analyzer import VulnerabilityMatcher, VulnerabilityDatabase\r\n\r\ndb = VulnerabilityDatabase()\r\nmatcher = VulnerabilityMatcher(db)\r\n\r\n# Match network data against vulnerabilities\r\npcap_matches = matcher.match_pcap_data(pcap_results)\r\nnmap_matches = matcher.match_nmap_data(nmap_results)\r\n\r\n# Get detailed match information\r\nfor match in pcap_matches:\r\n print(f\"CVE: {match.cve_id}\")\r\n print(f\"Severity: {match.severity}\")\r\n print(f\"Description: {match.description}\")\r\n```\r\n\r\n## Library Structure\r\n\r\n```\r\nvulnerability_analyzer/\r\n\u251c\u2500\u2500 __init__.py # Main library interface\r\n\u251c\u2500\u2500 core/ # Core functionality\r\n\u2502 \u251c\u2500\u2500 database.py # Vulnerability database management\r\n\u2502 \u251c\u2500\u2500 pcap_analyzer.py # PCAP analysis tools\r\n\u2502 \u251c\u2500\u2500 nmap_analyzer.py # Nmap XML parsing\r\n\u2502 \u2514\u2500\u2500 matcher.py # Vulnerability matching engine\r\n\u251c\u2500\u2500 data/ # Data management\r\n\u2502 \u251c\u2500\u2500 nvd.py # NVD API integration\r\n\u2502 \u251c\u2500\u2500 exploitdb.py # ExploitDB data handling\r\n\u2502 \u2514\u2500\u2500 routersploit.py # RouterSploit data integration\r\n\u251c\u2500\u2500 utils/ # Utility functions\r\n\u2502 \u251c\u2500\u2500 filters.py # Traffic and data filters\r\n\u2502 \u251c\u2500\u2500 reports.py # Report generation\r\n\u2502 \u2514\u2500\u2500 helpers.py # Helper functions\r\n\u2514\u2500\u2500 examples/ # Usage examples\r\n \u251c\u2500\u2500 basic_analysis.py\r\n \u251c\u2500\u2500 pcap_scanning.py\r\n \u2514\u2500\u2500 vulnerability_research.py\r\n```\r\n\r\n## Examples\r\n\r\n### Basic Vulnerability Analysis\r\n```python\r\nimport vulnerability_analyzer\r\n\r\n# Initialize\r\ndb = vulnerability_analyzer.VulnerabilityDatabase()\r\nanalyzer = vulnerability_analyzer.PcapAnalyzer()\r\n\r\n# Analyze network traffic\r\ntraffic_data = analyzer.analyze(\"network.pcap\")\r\n\r\n# Find vulnerabilities\r\nmatcher = vulnerability_analyzer.VulnerabilityMatcher(db)\r\nvulnerabilities = matcher.match_traffic(traffic_data)\r\n\r\n# Generate report\r\nreport = vulnerability_analyzer.generate_report(vulnerabilities, format=\"json\")\r\n```\r\n\r\n### Router Vulnerability Assessment\r\n```python\r\nimport vulnerability_analyzer\r\n\r\n# Load router-specific vulnerability data\r\ndb = vulnerability_analyzer.VulnerabilityDatabase()\r\nrouter_cves = db.search_by_category(\"router\")\r\n\r\n# Analyze router traffic\r\nanalyzer = vulnerability_analyzer.PcapAnalyzer()\r\nrouter_traffic = analyzer.filter_router_traffic(\"capture.pcap\")\r\n\r\n# Match against router vulnerabilities\r\nmatcher = vulnerability_analyzer.VulnerabilityMatcher(db)\r\nrouter_vulns = matcher.match_router_signatures(router_traffic)\r\n```\r\n\r\n### Integration with Existing Tools\r\n```python\r\n# Use with pandas for data analysis\r\nimport pandas as pd\r\nimport vulnerability_analyzer\r\n\r\ndb = vulnerability_analyzer.VulnerabilityDatabase()\r\ncves_df = pd.DataFrame(db.load_cves())\r\n\r\n# Filter high-severity CVEs\r\ncritical_cves = cves_df[cves_df['severity'] == 'CRITICAL']\r\n\r\n# Use with requests for API integration\r\nimport requests\r\nimport pysploit\r\n\r\n# Fetch live vulnerability feeds\r\nnvd_updater = pysploit.NVDUpdater()\r\nlatest_cves = nvd_updater.fetch_recent_cves(days=7)\r\n```\r\n\r\n## Data Sources\r\n\r\n- **National Vulnerability Database (NVD)**: https://services.nvd.nist.gov/rest/json/cves/2.0\r\n- **ExploitDB**: https://gitlab.com/exploit-database/exploitdb\r\n- **RouterSploit Framework**: https://github.com/threat9/routersploit\r\n\r\n## Package Information\r\n\r\n### Naming Convention\r\n- **PyPI Package:** `vulnerability-analyzer` (used for installation)\r\n- **Python Module:** `pysploit` (used for imports)\r\n- **GitHub Repository:** `vulnerability-analyzer`\r\n\r\n### Why Two Names?\r\nThe package was originally developed as \"PySploit\" but the name was already taken on PyPI. Rather than changing all the internal Python module names and breaking existing code, we chose to:\r\n- Keep the Python module name as `pysploit` (for backward compatibility)\r\n- Use `vulnerability-analyzer` as the PyPI package name (for distribution)\r\n\r\nThis follows common Python packaging practices where the distribution name can differ from the import name.\r\n\r\n## License\r\n\r\nMIT License - see LICENSE file for details.\r\n\r\n## Contributing\r\n\r\n1. Fork the repository\r\n2. Create a feature branch\r\n3. Add tests for new functionality\r\n4. Submit a pull request\r\n",
"bugtrack_url": null,
"license": null,
"summary": "Advanced vulnerability analysis library with comprehensive security intelligence (Python module: vulnerability_analyzer)",
"version": "1.2.0",
"project_urls": {
"Bug Tracker": "https://github.com/D14b0l1c/vulnerability-analyzer/issues",
"Changelog": "https://github.com/D14b0l1c/vulnerability-analyzer/blob/main/CHANGELOG.md",
"Documentation": "https://github.com/D14b0l1c/vulnerability-analyzer#readme",
"Homepage": "https://github.com/D14b0l1c/vulnerability-analyzer",
"Repository": "https://github.com/D14b0l1c/vulnerability-analyzer.git"
},
"split_keywords": [
"vulnerability",
" security",
" cve",
" pcap",
" nmap",
" penetration-testing",
" security-assessment",
" network-analysis"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "f24a7d693e2b6fa452bcc5b0228b9f6996cc9d1523c7afb4455df4d5e66df0fc",
"md5": "f192a7f93b4982bc61e8ebfa664ee425",
"sha256": "2378829d14027e1dd285d4f3b50f60da60d962d48fe1916a20eef84dd3f9333c"
},
"downloads": -1,
"filename": "vulnerability_analyzer-1.2.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "f192a7f93b4982bc61e8ebfa664ee425",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 91871,
"upload_time": "2025-10-20T01:41:31",
"upload_time_iso_8601": "2025-10-20T01:41:31.643237Z",
"url": "https://files.pythonhosted.org/packages/f2/4a/7d693e2b6fa452bcc5b0228b9f6996cc9d1523c7afb4455df4d5e66df0fc/vulnerability_analyzer-1.2.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "09e204357c5c05bbb2d0b4ea45965ee1da2dabcc0a8bd5e1107bc7ff8c519de9",
"md5": "779c59c4cb0eb9d5fa718da36c12c4ac",
"sha256": "a836f90434f8ebca998545678dba5e593de241fae511a862f0fcb7ea76f7a6c3"
},
"downloads": -1,
"filename": "vulnerability_analyzer-1.2.0.tar.gz",
"has_sig": false,
"md5_digest": "779c59c4cb0eb9d5fa718da36c12c4ac",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 132909,
"upload_time": "2025-10-20T01:41:32",
"upload_time_iso_8601": "2025-10-20T01:41:32.706219Z",
"url": "https://files.pythonhosted.org/packages/09/e2/04357c5c05bbb2d0b4ea45965ee1da2dabcc0a8bd5e1107bc7ff8c519de9/vulnerability_analyzer-1.2.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-10-20 01:41:32",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "D14b0l1c",
"github_project": "vulnerability-analyzer",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "vulnerability-analyzer"
}