Packages and Binaries:

sploitscan

SploitScan is an efficient and easy-to-use command-line tool designed to consult CVE (Common Vulnerabilities and Exposures). Extremely important for professionals, as it allows them to implement measures that prevent the exploitation of discovered vulnerabilities.

Tool is capable of exporting in a single run results for JSON and CSV formats, from the main databases of entities and organizations linked to cybersecurity: - MITER Corporation. non-profit organization that provides technical solutions to critical security issue - EPSS (Exploit Prediction Scoring System) is a system that aims to predict the probability of a specific vulnerability, helping organizations prioritize their mitigation activities. - Gather PoCs (Proof of Concepts) Collecting PoCs is a common activity among vulnerability researchers and security professionals, who reproduce the severity of vulnerabilities in a controlled environment, aiming to take preventive measures. - CISA Infrastructure Security Agency - responsible for keeping Known Exploited Vulnerabilities Catalog (KEV) updated. - Capable of interacting with the Patch Priority System, responsible for evaluating and assigning a patch priority rating based on several factors, including the availability of public exploits.

Installed size: 160 KB
How to install: sudo apt install sploitscan

Dependencies:
  • python3
  • python3-jinja2
  • python3-openai
  • python3-requests
  • python3-tabulate
sploitscan

A tool to fetch and display vulnerability information and public exploits for given CVE IDs.

root@kali:~# sploitscan -h

███████╗██████╗ ██╗      ██████╗ ██╗████████╗███████╗ ██████╗ █████╗ ███╗   ██╗
██╔════╝██╔══██╗██║     ██╔═══██╗██║╚══██╔══╝██╔════╝██╔════╝██╔══██╗████╗  ██║
███████╗██████╔╝██║     ██║   ██║██║   ██║   ███████╗██║     ███████║██╔██╗ ██║
╚════██║██╔═══╝ ██║     ██║   ██║██║   ██║   ╚════██║██║     ██╔══██║██║╚██╗██║
███████║██║     ███████╗╚██████╔╝██║   ██║   ███████║╚██████╗██║  ██║██║ ╚████║
╚══════╝╚═╝     ╚══════╝ ╚═════╝ ╚═╝   ╚═╝   ╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═══╝
v0.10.5 / Alexander Hagenah / @xaitax / [email protected]

usage: sploitscan [-h] [-e {json,JSON,csv,CSV,html,HTML}]
                  [-t {nessus,nexpose,openvas,docker}] [-i IMPORT_FILE]
                  [-c CONFIG] [-d]
                  [cve_ids ...]

SploitScan: Retrieve and display vulnerability data as well as public exploits
for given CVE ID(s).

positional arguments:
  cve_ids               Enter one or more CVE IDs to fetch data. Separate
                        multiple CVE IDs with spaces. Format for each ID: CVE-
                        YYYY-NNNNN. This argument is optional if an import
                        file is provided using the -i option.

options:
  -h, --help            show this help message and exit
  -e {json,JSON,csv,CSV,html,HTML}, --export {json,JSON,csv,CSV,html,HTML}
                        Optional: Export the results to a JSON, CSV, or HTML
                        file. Specify the format: 'json', 'csv', or 'html'.
  -t {nessus,nexpose,openvas,docker}, --type {nessus,nexpose,openvas,docker}
                        Specify the type of the import file: 'nessus',
                        'nexpose', 'openvas' or 'docker'.
  -i IMPORT_FILE, --import-file IMPORT_FILE
                        Path to an import file from a vulnerability scanner.
                        If used, CVE IDs can be omitted from the command line
                        arguments.
  -c CONFIG, --config CONFIG
                        Path to a custom config file.
  -d, --debug           Enable debug output.

Updated on: 2024-Nov-17