pyExploitDb 0.2.9__py3-none-any.whl → 0.2.17__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,23 +1,26 @@
1
- Metadata-Version: 2.0
1
+ Metadata-Version: 2.1
2
2
  Name: pyExploitDb
3
- Version: 0.2.9
3
+ Version: 0.2.17
4
4
  Summary: An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
5
5
  Home-page: https://github.com/GoVanguard/pyExploitDb
6
6
  Author: Shane William Scott
7
7
  Author-email: sscott@gotham-security.com
8
- License: UNKNOWN
9
- Platform: UNKNOWN
10
8
  Classifier: Development Status :: 5 - Production/Stable
11
9
  Classifier: Intended Audience :: Developers
12
10
  Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
13
11
  Classifier: Programming Language :: Python :: 3.6
12
+ Classifier: Programming Language :: Python :: 3.7
13
+ Classifier: Programming Language :: Python :: 3.8
14
+ Classifier: Programming Language :: Python :: 3.9
15
+ Classifier: Programming Language :: Python :: 3.10
16
+ Classifier: Programming Language :: Python :: 3.11
14
17
  Classifier: Operating System :: OS Independent
15
18
  Description-Content-Type: text/markdown
16
19
  License-File: LICENSE
17
20
  Requires-Dist: GitPython
18
21
  Requires-Dist: requests
19
22
 
20
- pyExploitDb (https://govanguard.com)
23
+ pyExploitDb (https://gotham-security.com)
21
24
  ==
22
25
 
23
26
  [![Build Status](https://travis-ci.com/GoVanguard/pyExploitDb.svg?branch=master)](https://travis-ci.com/GoVanguard/pyExploitDb)
@@ -30,7 +33,6 @@ Shane William Scott
30
33
 
31
34
  ## About pyExploitDb
32
35
  An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
33
- Last DB Refresh: 02/24/2023
34
36
 
35
37
  ## Upcoming features
36
38
  > CPE database, indexes and mappings
@@ -63,5 +65,3 @@ Port: 80
63
65
 
64
66
  ## Credits
65
67
  Originally based on fork of cve_searchsploit by Andrea Fioraldi.
66
-
67
-
@@ -0,0 +1,8 @@
1
+ pyExploitDb/__init__.py,sha256=dBPIBtm3EWgqm0JuTnxeYrLmqN8Uj5cRZMWsiCJDOGQ,8260
2
+ pyExploitDb/cveToEdbid.json,sha256=kczgapsO29ggqovwzzLtLrhaCnHTdtjOtf0V2gxdIgs,984170
3
+ pyExploitDb/edbidToCve.json,sha256=icwmSb_zc9sJWTcILMQ-wplMw_xiAIe95h9IfafZ6v8,1356825
4
+ pyExploitDb-0.2.17.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
5
+ pyExploitDb-0.2.17.dist-info/METADATA,sha256=blgYs1kMdpjj_talwaLV8w2M-8AmPWgwaKR4Jaw1oRA,2616
6
+ pyExploitDb-0.2.17.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
7
+ pyExploitDb-0.2.17.dist-info/top_level.txt,sha256=9RS0bXZhz9Wz4-FytP-Cs8qpdAuVzWqmHQRnjYtuOwk,12
8
+ pyExploitDb-0.2.17.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: bdist_wheel (0.24.0)
2
+ Generator: bdist_wheel (0.43.0)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5
 
@@ -1,48 +0,0 @@
1
- pyExploitDb (https://govanguard.com)
2
- ==
3
-
4
- [![Build Status](https://travis-ci.com/GoVanguard/pyExploitDb.svg?branch=master)](https://travis-ci.com/GoVanguard/pyExploitDb)
5
- [![Known Vulnerabilities](https://snyk.io/test/github/GoVanguard/pyExploitDb/badge.svg?targetFile=requirements.txt)](https://snyk.io/test/github/GoVanguard/pyExploitDb?targetFile=requirements.txt)
6
- [![Maintainability](https://api.codeclimate.com/v1/badges/c718eabcdd4b815698db/maintainability)](https://codeclimate.com/github/GoVanguard/pyExploitDb/maintainability)
7
-
8
-
9
- ## Authors:
10
- Shane William Scott
11
-
12
- ## About pyExploitDb
13
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
14
- Last DB Refresh: 02/24/2023
15
-
16
- ## Upcoming features
17
- > CPE database, indexes and mappings
18
-
19
- ## Installation
20
- pip install pyExploitDb
21
- > Note: This assumes pip is for your python3 environment. Use pip3 if pip is for your python2 environment.
22
-
23
- ## Example Usage
24
- ```python
25
- from pyExploitDb import PyExploitDb
26
- pEdb = PyExploitDb()
27
- pEdb.debug = False
28
- pEdb.openFile()
29
- results = pEdb.searchCve("CVE-2018-14592")
30
- print(results)
31
- ```
32
-
33
- ## Example debug/verbose output
34
- CVE-2018-1459
35
- Found
36
- Exploit DB Id: 45447
37
- File: ./exploit-database/exploits/php/webapps/45447.txt
38
- Date: 2018-09-24
39
- Author: Haboob Team
40
- Platform: webapps
41
- Type: php
42
- Port: 80
43
- {'edbid': '45447', 'exploit': './exploit-database/exploits/php/webapps/45447.txt', 'date': '2018-09-24', 'author': 'Haboob Team', 'platform': 'webapps', 'type': 'php', 'port': '80'}
44
-
45
- ## Credits
46
- Originally based on fork of cve_searchsploit by Andrea Fioraldi.
47
-
48
-
@@ -1,9 +0,0 @@
1
- pyExploitDb/__init__.py,sha256=dBPIBtm3EWgqm0JuTnxeYrLmqN8Uj5cRZMWsiCJDOGQ,8260
2
- pyExploitDb/cveToEdbid.json,sha256=-y3MKuAdtJxR9H8h0fSZ01jx8BsrRKFoKwXBr2IiyYE,980047
3
- pyExploitDb/edbidToCve.json,sha256=6wHE15JTpYTbZL8_OfU9EzHX0l4mbfY4mbFjSoF3CJI,1340180
4
- pyExploitDb-0.2.9.dist-info/DESCRIPTION.rst,sha256=8oOP4_PR-w6YSRfj01D6wRS8lqMGSa_lnvoB-qYZl2U,1644
5
- pyExploitDb-0.2.9.dist-info/METADATA,sha256=ZDIVHlACt0zZcY7Pz24mnuE6YpkPHHyBFfnFFVmea5g,2423
6
- pyExploitDb-0.2.9.dist-info/RECORD,,
7
- pyExploitDb-0.2.9.dist-info/WHEEL,sha256=-aSo8rHuuPDEFzkcqqQ55pDyCjy25bYMLxSiHWKAOTc,92
8
- pyExploitDb-0.2.9.dist-info/metadata.json,sha256=EMg_ADD5nHkUCblrfuFiLoSNPV5XmpqcuQb_i9kOYtI,949
9
- pyExploitDb-0.2.9.dist-info/top_level.txt,sha256=9RS0bXZhz9Wz4-FytP-Cs8qpdAuVzWqmHQRnjYtuOwk,12
@@ -1 +0,0 @@
1
- {"generator": "bdist_wheel (0.24.0)", "summary": "An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.", "metadata_version": "2.0", "name": "pyExploitDb", "version": "0.2.9", "extensions": {"python.details": {"project_urls": {"Home": "https://github.com/GoVanguard/pyExploitDb"}, "contacts": [{"email": "sscott@gotham-security.com", "name": "Shane William Scott", "role": "author"}], "document_names": {"description": "DESCRIPTION.rst"}}}, "classifiers": ["Development Status :: 5 - Production/Stable", "Intended Audience :: Developers", "License :: OSI Approved :: GNU General Public License v3 (GPLv3)", "Programming Language :: Python :: 3.6", "Operating System :: OS Independent"], "description_content_type": "text/markdown", "license_file": "LICENSE", "run_requires": [{"requires": ["GitPython", "requests"]}], "extras": []}