Skip to content

ijatrom/searchcve

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

searchcve

Web scrapping tool written in python3, using regex, to get CVEs, Source and URLs.

Generates a CSV file in the current directory.

Dependencies

  • requests must be installed.

pip install requests should do this job :)

Example of usage

python3 searchcve.py https://us-cert.cisa.gov/ncas/alerts/aa21-209a
python3 searchcve.py https://www.kennasecurity.com/blog/top-vulnerabilities-of-the-decade/
python3 searchcve.py https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/
python3 searchcve.py https://nvd.nist.gov/ 

On Linux

./searchcve.py https://us-cert.cisa.gov/ncas/alerts/aa21-209a
./searchcve.py https://nvd.nist.gov/ 

image

image

Work in progress

Command line tool, will use the NIST API to get resources.

usage: searchcve_api.py [-h] [-c CVE] [-k KEYWORD] [-u URL] [-i INPUT_FILE]

optional arguments:
  -h, --help            show this help message and exit
  -c CVE, --cve CVE     Choose CVE e.g. CVE-2020-1472
  -k KEYWORD, --keyword KEYWORD
                        Choose keyword e.g. microsoft
  -u URL, --url URL     Choose URL e.g. https://nvd.nist.gov/
  -i INPUT_FILE, --input-file INPUT_FILE
                        Choose the path to input file e.g. test.csv
python3 searchcve_api.py -u https://nvd.nist.gov/

This will call python3 searchcve.py https://nvd.nist.gov/

python3 searchcve_api.py -c CVE-2020-1467

image

This will make this API call https://services.nvd.nist.gov/rest/json/cve/1.0/CVE-2020-1467

python3 searchcve_api.py -k microsoft

This will make this API call https://services.nvd.nist.gov/rest/json/cves/1.0?keyword=microsoft

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages