You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Added support for multiple AI providers in risk assessment. Users can now choose between OpenAI ChatGPT, Google Gemini, Grok AI or DeepSeek via the new `--ai` option.
7
+
8
+
-**Local CVE Database Update & Cloning**
9
+
Implemented update (`--local`) functionality for the CVE List V5 repository. SploitScan now clones (or pulls updates from) the full CVE List V5 repository locally.
10
+
11
+
-**Keyword-Based CVE Search Across Sources**
12
+
Enhanced the search functionality to allow users to search for keywords via `--keywords` (e.g., "Apple") across both the local CVE database and remote sources (CISA and Nuclei Templates). All matching CVEs are automatically looked up by SploitScan to search for associated exploits.
13
+
14
+
-**Fast Mode for Streamlined Output**
15
+
Introduced a fast mode (`--fast-mode`) that limits the output to only basic CVE information, bypassing additional lookups (such as public exploits, EPSS, and risk assessments) for quicker results.
Copy file name to clipboardExpand all lines: README.md
+145-44
Original file line number
Diff line number
Diff line change
@@ -23,22 +23,51 @@ SploitScan is a powerful and user-friendly tool designed to streamline the proce
23
23
- 🫱🏼🫲🏽 [Contributing](#-contributing)
24
24
- 📌 [Author](#-author)
25
25
- 📆 [Changelog](#-changelog)
26
-
- 📚 [References](#-references)
27
26
28
27
## 🌟 Features
29
28
30
-
-**CVE Information Retrieval**: Fetches CVE details from the National Vulnerability Database.
31
-
-**EPSS Integration**: Includes Exploit Prediction Scoring System (EPSS) data, offering a probability score for the likelihood of CVE exploitation, aiding in prioritization.
32
-
-**Public Exploits Aggregation**: Gathers publicly available exploits, enhancing the understanding of vulnerabilities.
33
-
-**CISA KEV**: Shows if the CVE has been listed in the Known Exploited Vulnerabilities (KEV) of CISA.
34
-
-**AI-Powered Risk Assessment**: Leverages OpenAI to provide detailed risk assessments, potential attack scenarios, mitigation recommendations, and executive summaries.
35
-
-**HackerOne Reports**: Shows if the CVE was used within HackerOne Bug Bounty programs including their total rank overall and severity distribution.
36
-
-**Patching Priority System**: Evaluates and assigns a priority rating for patching based on various factors including public exploits availability.
37
-
-**Multi-CVE Support and Export Options**: Supports multiple CVEs in a single run and allows exporting the results to HTML, JSON and CSV formats.
38
-
-**Vulnerability Scanner Import**: Import vulnerability scans from popular vulnerability scanners and search directly for known exploits.
39
-
-**Granular Method Selection**: Only specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, etc.), giving you control over what data you want to retrieve.
40
-
-**User-Friendly Interface**: Easy to use, providing clear and concise information.
41
-
-**Comprehensive Security Tool**: Ideal for quick security assessments and staying informed about recent vulnerabilities.
29
+
-**CVE Information Retrieval**
30
+
Retrieve detailed information about vulnerabilities.
31
+
32
+
-**EPSS Integration**
33
+
Check the likelihood of exploitation with data from the Exploit Prediction Scoring System.
34
+
35
+
-**Public Exploits Aggregation**
36
+
Collect publicly available exploit data to help you understand the context of each vulnerability.
37
+
38
+
-**CISA KEV Integration**
39
+
Quickly see if a vulnerability is listed in CISA’s Known Exploited Vulnerabilities catalog.
40
+
41
+
-**AI-Powered Risk Assessment**
42
+
Get risk assessments using multiple AI providers (OpenAI ChatGPT, Google Gemini, Grok AI, or DeepSeek) that explain potential risks and offer mitigation ideas.
43
+
44
+
-**HackerOne Reports**
45
+
Find out if a vulnerability has been involved in HackerOne bug bounty reports, including basic ranking and severity details.
46
+
47
+
-**Patching Priority System**
48
+
Receive a simple priority rating for patching based on CVSS, EPSS, and available exploit information.
49
+
50
+
-**Multi-CVE Support and Export Options**
51
+
Work with multiple CVEs at once and export the results to HTML, JSON, or CSV formats.
52
+
53
+
-**Vulnerability Scanner Import**
54
+
Import scan results from popular vulnerability scanners (Nessus, Nexpose, OpenVAS, Docker) to directly search for known exploits.
55
+
56
+
-**Granular Method Selection**
57
+
Choose which specific data retrieval methods to run (such as CISA, EPSS, HackerOne, AI, etc.) so you only get the information you need.
58
+
59
+
-**Local CVE Database Update & Cloning**
60
+
Maintain a local copy of the CVE List V5 repository. This lets you update the full CVE data on your machine for offline use and search.
61
+
62
+
-**Keyword-Based CVE Search Across Sources**
63
+
Search for CVEs by keywords (for example, “Apple”) across both your local database and remote sources like CISA and Nuclei Templates.
64
+
65
+
-**Fast Mode for Streamlined Output**
66
+
Use fast mode to display only the basic CVE information, skipping extra lookups for quicker results.
67
+
68
+
-**User-Friendly Interface**
69
+
Enjoy a clear and straightforward interface that presents all the information in an easy-to-read format.
SploitScan: Retrieve and display vulnerability data as well as public exploits forgiven CVE ID(s).
162
+
SploitScan: Retrieve and display vulnerability and exploit data forspecified CVE ID(s).
128
163
129
164
positional arguments:
130
-
cve_ids Enter one or more CVE IDs to fetch data. Separate multiple CVE IDs with spaces. Format for each ID: CVE-YYYY-NNNNN. This argument is optional if an import file is provided
131
-
using the -i option.
165
+
cve_ids Enter one or more CVE IDs (e.g., CVE-YYYY-NNNNN). This is optional if an import file is provided via -i.
Search for CVEs related to specific keywords (e.g., product name).
177
+
-local, --local-database
178
+
Download the cvelistV5 repository into the local directory. Use the local database over online research if available.
179
+
-f, --fast-mode Enable fast mode: only display basic CVE information without fetching additional exploits or data.
139
180
-m METHODS, --methods METHODS
140
-
Specify which methods to run, separated by commas. Options: 'cisa', 'epss', 'hackerone', 'ai', 'prio', 'references', etc.
181
+
Specify which methods to run, separated by commas (e.g., 'cisa,epss,hackerone,ai,prio,references').
141
182
-i IMPORT_FILE, --import-file IMPORT_FILE
142
-
Path to an import file. If used, CVE IDs can be omitted from the command line arguments. Expected file type is a plain text file with one CVE per line. Vulnerability scanner
143
-
files can be imported also with the --type argument to specify the correct type
183
+
Path to an import file. When provided, positional CVE IDs can be omitted. The file should be a plain text list with one CVE per line.
144
184
-c CONFIG, --config CONFIG
145
-
Path to a custom config file.
185
+
Path to a custom configuration file.
146
186
-d, --debug Enable debug output.
147
187
```
148
188
@@ -158,6 +198,77 @@ sploitscan CVE-2024-1709
158
198
sploitscan CVE-2024-1709 CVE-2024-21413
159
199
```
160
200
201
+
### Local CVE Database Update
202
+
203
+
You can now update (or initially clone) the full CVE List V5 repository locally by using the `--local` option. Note that this repository is several GB in size, so the download may take a while. For example:
📥 Cloning CVE List V5 into 'C:\Users\ah/.sploitscan\cvelistV5'.
217
+
⚠️ Warning: The repository is several GB in size and the download may take a while.
218
+
🔄 Progress: 100.00% - 940.62 MiB | 4.97 MiB/s
219
+
✅ CVE List V5 cloned successfully.
220
+
```
221
+
222
+
### Keyword-Based Search Across Sources
223
+
224
+
Search for CVEs by keywords (e.g., "Apple") across the local database, CISA, and Nuclei Templates.
225
+
226
+
> [!TIP]
227
+
> This can replace more or less replace [searchsploit](https://www.exploit-db.com/searchsploit) as [ExploitDB](https://www.exploit-db.com/) isn't regularly updated anymore.
description = "SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits."
7
+
version = "0.13.0"
8
+
description = "SploitScan is a cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits."
0 commit comments