pyExploitDb 0.2.9__py3-none-any.whl → 0.2.16__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pyExploitDb/cveToEdbid.json +320 -1
- pyExploitDb/edbidToCve.json +1147 -1
- pyExploitDb-0.2.16.dist-info/LICENSE +674 -0
- {pyExploitDb-0.2.9.dist-info → pyExploitDb-0.2.16.dist-info}/METADATA +8 -8
- pyExploitDb-0.2.16.dist-info/RECORD +8 -0
- {pyExploitDb-0.2.9.dist-info → pyExploitDb-0.2.16.dist-info}/WHEEL +1 -1
- pyExploitDb-0.2.9.dist-info/DESCRIPTION.rst +0 -48
- pyExploitDb-0.2.9.dist-info/RECORD +0 -9
- pyExploitDb-0.2.9.dist-info/metadata.json +0 -1
- {pyExploitDb-0.2.9.dist-info → pyExploitDb-0.2.16.dist-info}/top_level.txt +0 -0
@@ -1,23 +1,26 @@
|
|
1
|
-
Metadata-Version: 2.
|
1
|
+
Metadata-Version: 2.1
|
2
2
|
Name: pyExploitDb
|
3
|
-
Version: 0.2.
|
3
|
+
Version: 0.2.16
|
4
4
|
Summary: An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
|
5
5
|
Home-page: https://github.com/GoVanguard/pyExploitDb
|
6
6
|
Author: Shane William Scott
|
7
7
|
Author-email: sscott@gotham-security.com
|
8
|
-
License: UNKNOWN
|
9
|
-
Platform: UNKNOWN
|
10
8
|
Classifier: Development Status :: 5 - Production/Stable
|
11
9
|
Classifier: Intended Audience :: Developers
|
12
10
|
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
|
13
11
|
Classifier: Programming Language :: Python :: 3.6
|
12
|
+
Classifier: Programming Language :: Python :: 3.7
|
13
|
+
Classifier: Programming Language :: Python :: 3.8
|
14
|
+
Classifier: Programming Language :: Python :: 3.9
|
15
|
+
Classifier: Programming Language :: Python :: 3.10
|
16
|
+
Classifier: Programming Language :: Python :: 3.11
|
14
17
|
Classifier: Operating System :: OS Independent
|
15
18
|
Description-Content-Type: text/markdown
|
16
19
|
License-File: LICENSE
|
17
20
|
Requires-Dist: GitPython
|
18
21
|
Requires-Dist: requests
|
19
22
|
|
20
|
-
pyExploitDb (https://
|
23
|
+
pyExploitDb (https://gotham-security.com)
|
21
24
|
==
|
22
25
|
|
23
26
|
[](https://travis-ci.com/GoVanguard/pyExploitDb)
|
@@ -30,7 +33,6 @@ Shane William Scott
|
|
30
33
|
|
31
34
|
## About pyExploitDb
|
32
35
|
An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
|
33
|
-
Last DB Refresh: 02/24/2023
|
34
36
|
|
35
37
|
## Upcoming features
|
36
38
|
> CPE database, indexes and mappings
|
@@ -63,5 +65,3 @@ Port: 80
|
|
63
65
|
|
64
66
|
## Credits
|
65
67
|
Originally based on fork of cve_searchsploit by Andrea Fioraldi.
|
66
|
-
|
67
|
-
|
@@ -0,0 +1,8 @@
|
|
1
|
+
pyExploitDb/__init__.py,sha256=dBPIBtm3EWgqm0JuTnxeYrLmqN8Uj5cRZMWsiCJDOGQ,8260
|
2
|
+
pyExploitDb/cveToEdbid.json,sha256=kczgapsO29ggqovwzzLtLrhaCnHTdtjOtf0V2gxdIgs,984170
|
3
|
+
pyExploitDb/edbidToCve.json,sha256=L-tdFd9frq4noMb5HrXr16qpY0tFTcQg49ZS4imHvNc,1356795
|
4
|
+
pyExploitDb-0.2.16.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
|
5
|
+
pyExploitDb-0.2.16.dist-info/METADATA,sha256=sX1E6DUZqtiTfuouySk08PGUp5Rn6SZKpRCnEbkrMiA,2616
|
6
|
+
pyExploitDb-0.2.16.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
|
7
|
+
pyExploitDb-0.2.16.dist-info/top_level.txt,sha256=9RS0bXZhz9Wz4-FytP-Cs8qpdAuVzWqmHQRnjYtuOwk,12
|
8
|
+
pyExploitDb-0.2.16.dist-info/RECORD,,
|
@@ -1,48 +0,0 @@
|
|
1
|
-
pyExploitDb (https://govanguard.com)
|
2
|
-
==
|
3
|
-
|
4
|
-
[](https://travis-ci.com/GoVanguard/pyExploitDb)
|
5
|
-
[](https://snyk.io/test/github/GoVanguard/pyExploitDb?targetFile=requirements.txt)
|
6
|
-
[](https://codeclimate.com/github/GoVanguard/pyExploitDb/maintainability)
|
7
|
-
|
8
|
-
|
9
|
-
## Authors:
|
10
|
-
Shane William Scott
|
11
|
-
|
12
|
-
## About pyExploitDb
|
13
|
-
An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
|
14
|
-
Last DB Refresh: 02/24/2023
|
15
|
-
|
16
|
-
## Upcoming features
|
17
|
-
> CPE database, indexes and mappings
|
18
|
-
|
19
|
-
## Installation
|
20
|
-
pip install pyExploitDb
|
21
|
-
> Note: This assumes pip is for your python3 environment. Use pip3 if pip is for your python2 environment.
|
22
|
-
|
23
|
-
## Example Usage
|
24
|
-
```python
|
25
|
-
from pyExploitDb import PyExploitDb
|
26
|
-
pEdb = PyExploitDb()
|
27
|
-
pEdb.debug = False
|
28
|
-
pEdb.openFile()
|
29
|
-
results = pEdb.searchCve("CVE-2018-14592")
|
30
|
-
print(results)
|
31
|
-
```
|
32
|
-
|
33
|
-
## Example debug/verbose output
|
34
|
-
CVE-2018-1459
|
35
|
-
Found
|
36
|
-
Exploit DB Id: 45447
|
37
|
-
File: ./exploit-database/exploits/php/webapps/45447.txt
|
38
|
-
Date: 2018-09-24
|
39
|
-
Author: Haboob Team
|
40
|
-
Platform: webapps
|
41
|
-
Type: php
|
42
|
-
Port: 80
|
43
|
-
{'edbid': '45447', 'exploit': './exploit-database/exploits/php/webapps/45447.txt', 'date': '2018-09-24', 'author': 'Haboob Team', 'platform': 'webapps', 'type': 'php', 'port': '80'}
|
44
|
-
|
45
|
-
## Credits
|
46
|
-
Originally based on fork of cve_searchsploit by Andrea Fioraldi.
|
47
|
-
|
48
|
-
|
@@ -1,9 +0,0 @@
|
|
1
|
-
pyExploitDb/__init__.py,sha256=dBPIBtm3EWgqm0JuTnxeYrLmqN8Uj5cRZMWsiCJDOGQ,8260
|
2
|
-
pyExploitDb/cveToEdbid.json,sha256=-y3MKuAdtJxR9H8h0fSZ01jx8BsrRKFoKwXBr2IiyYE,980047
|
3
|
-
pyExploitDb/edbidToCve.json,sha256=6wHE15JTpYTbZL8_OfU9EzHX0l4mbfY4mbFjSoF3CJI,1340180
|
4
|
-
pyExploitDb-0.2.9.dist-info/DESCRIPTION.rst,sha256=8oOP4_PR-w6YSRfj01D6wRS8lqMGSa_lnvoB-qYZl2U,1644
|
5
|
-
pyExploitDb-0.2.9.dist-info/METADATA,sha256=ZDIVHlACt0zZcY7Pz24mnuE6YpkPHHyBFfnFFVmea5g,2423
|
6
|
-
pyExploitDb-0.2.9.dist-info/RECORD,,
|
7
|
-
pyExploitDb-0.2.9.dist-info/WHEEL,sha256=-aSo8rHuuPDEFzkcqqQ55pDyCjy25bYMLxSiHWKAOTc,92
|
8
|
-
pyExploitDb-0.2.9.dist-info/metadata.json,sha256=EMg_ADD5nHkUCblrfuFiLoSNPV5XmpqcuQb_i9kOYtI,949
|
9
|
-
pyExploitDb-0.2.9.dist-info/top_level.txt,sha256=9RS0bXZhz9Wz4-FytP-Cs8qpdAuVzWqmHQRnjYtuOwk,12
|
@@ -1 +0,0 @@
|
|
1
|
-
{"generator": "bdist_wheel (0.24.0)", "summary": "An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.", "metadata_version": "2.0", "name": "pyExploitDb", "version": "0.2.9", "extensions": {"python.details": {"project_urls": {"Home": "https://github.com/GoVanguard/pyExploitDb"}, "contacts": [{"email": "sscott@gotham-security.com", "name": "Shane William Scott", "role": "author"}], "document_names": {"description": "DESCRIPTION.rst"}}}, "classifiers": ["Development Status :: 5 - Production/Stable", "Intended Audience :: Developers", "License :: OSI Approved :: GNU General Public License v3 (GPLv3)", "Programming Language :: Python :: 3.6", "Operating System :: OS Independent"], "description_content_type": "text/markdown", "license_file": "LICENSE", "run_requires": [{"requires": ["GitPython", "requests"]}], "extras": []}
|
File without changes
|