Skip to content

Commit ce0eb1a

Browse files
committed
[05. September 2024] - Version 0.11.0
- **Method Selection Added**: Introduced a new `-m` argument to allow users to selectively run specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, `prio`, `references`). This enables more granular control over which data sources and assessments are retrieved for each CVE. - **Import List Auto-Detection**: Added functionality to automatically detect and handle plain text CVE lists when using the `-i` option without specifying an import type (`-t`). If the file is detected as a plain text CVE list, it will import the CVE IDs directly without requiring a specific type. - **CSV Export Fix**: Fixed an issue where CISA data was not properly exported to CSV. Now, all relevant CISA information is included in the exported CSV file. - **HTML Export Fix**: Resolved an issue where `NoneType` errors caused the HTML export to fail. Improved error handling to ensure that missing or empty data does not interrupt the export process.
1 parent 4fae4a2 commit ce0eb1a

4 files changed

Lines changed: 163 additions & 86 deletions

File tree

CHANGELOG.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
# 📆 Changelog
22

3+
## [05. September 2024] - Version 0.11.0
4+
5+
- **Method Selection Added**: Introduced a new `-m` argument to allow users to selectively run specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, `prio`, `references`). This enables more granular control over which data sources and assessments are retrieved for each CVE.
6+
- **Import List Auto-Detection**: Added functionality to automatically detect and handle plain text CVE lists when using the `-i` option without specifying an import type (`-t`). If the file is detected as a plain text CVE list, it will import the CVE IDs directly without requiring a specific type.
7+
- **CSV Export Fix**: Fixed an issue where CISA data was not properly exported to CSV. Now, all relevant CISA information is included in the exported CSV file.
8+
- **HTML Export Fix**: Resolved an issue where `NoneType` errors caused the HTML export to fail. Improved error handling to ensure that missing or empty data does not interrupt the export process.
9+
310
## [13. August 2024] - Version 0.10.5
411

512
- **General Improvements**: Prevent IndexError by checking for non-empty lists before accessing elements.

README.md

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@
22

33

44
![SPLOITSCAN-LOGO](https://github.com/xaitax/SploitScan/assets/5014849/05f6641c-2279-456f-9e5a-329926529169)
5+
![Version](https://img.shields.io/github/v/release/xaitax/SploitScan)
6+
![License](https://img.shields.io/github/license/xaitax/SploitScan)
7+
58

69
## 📜 Description
710

@@ -19,6 +22,7 @@ SploitScan is a powerful and user-friendly tool designed to streamline the proce
1922
- 🛡️ [Patching Priority System](#️-patching-priority-system)
2023
- 🫱🏼‍🫲🏽 [Contributing](#-contributing)
2124
- 📌 [Author](#-author)
25+
- 📆 [Changelog](#-changelog)
2226
- 📚 [References](#-references)
2327

2428
## 🌟 Features
@@ -32,6 +36,7 @@ SploitScan is a powerful and user-friendly tool designed to streamline the proce
3236
- **Patching Priority System**: Evaluates and assigns a priority rating for patching based on various factors including public exploits availability.
3337
- **Multi-CVE Support and Export Options**: Supports multiple CVEs in a single run and allows exporting the results to HTML, JSON and CSV formats.
3438
- **Vulnerability Scanner Import**: Import vulnerability scans from popular vulnerability scanners and search directly for known exploits.
39+
- **Granular Method Selection**: Only specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, etc.), giving you control over what data you want to retrieve.
3540
- **User-Friendly Interface**: Easy to use, providing clear and concise information.
3641
- **Comprehensive Security Tool**: Ideal for quick security assessments and staying informed about recent vulnerabilities.
3742

@@ -74,8 +79,15 @@ pip install --user sploitscan
7479
apt install sploitscan
7580
```
7681

82+
### Obtaining API Keys
83+
84+
- **VulnCheck**: Sign up for a free account at [VulnCheck](https://vulncheck.com/) to get your API key.
85+
- **OpenAI**: Create an account and get an API key at [OpenAI](https://platform.openai.com/signup/).
86+
7787
### Configuration File
7888

89+
Note: The OpenAI and VulnCheck API keys are optional. The OpenAI API key is used for AI-powered risk assessment, and the VulnCheck API key is used for VulnCheck data retrieval. If you do not intend to use these features, you can omit the configuration file or leave the API key fields blank.
90+
7991
Create a `config.json` file in one of the following locations with your API keys:
8092

8193
- Current directory
@@ -105,9 +117,9 @@ $ sploitscan.py -h
105117
╚════██║██╔═══╝ ██║ ██║ ██║██║ ██║ ╚════██║██║ ██╔══██║██║╚██╗██║
106118
███████║██║ ███████╗╚██████╔╝██║ ██║ ███████║╚██████╗██║ ██║██║ ╚████║
107119
╚══════╝╚═╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═╝ ╚══════╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═══╝
108-
v0.10.3 / Alexander Hagenah / @xaitax / ah@primepage.de
120+
v0.11.0 / Alexander Hagenah / @xaitax / ah@primepage.de
109121

110-
usage: sploitscan.py [-h] [-e {json,JSON,csv,CSV,html,HTML}] [-t {nessus,nexpose,openvas,docker}] [-i IMPORT_FILE] [-c CONFIG] [-d] [cve_ids ...]
122+
usage: sploitscan.py [-h] [-e {json,JSON,csv,CSV,html,HTML}] [-t {nessus,nexpose,openvas,docker}] [-m METHODS] [-i IMPORT_FILE] [-c CONFIG] [-d] [cve_ids ...]
111123

112124
SploitScan: Retrieve and display vulnerability data as well as public exploits for given CVE ID(s).
113125

@@ -121,6 +133,8 @@ options:
121133
Optional: Export the results to a JSON, CSV, or HTML file. Specify the format: 'json', 'csv', or 'html'.
122134
-t {nessus,nexpose,openvas,docker}, --type {nessus,nexpose,openvas,docker}
123135
Specify the type of the import file: 'nessus', 'nexpose', 'openvas' or 'docker'.
136+
-m METHODS, --methods METHODS
137+
Specify which methods to run, separated by commas. Options: 'cisa', 'epss', 'hackerone', 'ai', 'prio', 'references', etc.
124138
-i IMPORT_FILE, --import-file IMPORT_FILE
125139
Path to an import file from a vulnerability scanner. If used, CVE IDs can be omitted from the command line arguments.
126140
-c CONFIG, --config CONFIG
@@ -148,6 +162,14 @@ Specify the type: 'nessus', 'nexpose', 'openvas', or 'docker' and provide the fi
148162
sploitscan --import-file path/to/yourfile.nessus --type nessus
149163
```
150164
165+
### Select Specific Methods
166+
167+
To run only specific data retrieval methods (e.g., CISA, EPSS, AI risk assessment), use the `-m` argument:
168+
169+
```bash
170+
sploitscan CVE-2024-1709 -m cisa,epss
171+
```
172+
151173
### Export Results
152174
153175
Specify the export format: 'json', 'csv', or 'html'.
@@ -158,6 +180,10 @@ sploitscan CVE-2024-1709 -e html
158180
159181
### Docker
160182
183+
Ensure you have Docker installed. For installation instructions, see [Docker's official installation guide](https://docs.docker.com/get-docker/).
184+
185+
To build and run SploitScan in Docker:
186+
161187
```shell
162188
docker build -t sploitscan .
163189
docker run --rm sploitscan CVE-2024-1709
@@ -257,7 +283,7 @@ This system assists users in making informed decisions on which vulnerabilities
257283
258284
## 🫱🏼‍🫲🏽 Contributing
259285
260-
Contributions are welcome. Please feel free to fork, modify, and make pull requests or report issues.
286+
Contributions are welcome! Whether it's fixing bugs, adding new features, or improving the documentation, feel free to fork the repository and submit a pull request. You can also report issues or suggest enhancements through the GitHub issue tracker.
261287
262288
Special thanks to:
263289
@@ -277,6 +303,10 @@ Special thanks to:
277303
- [Twitter](https://twitter.com/xaitax)
278304
- [LinkedIn](https://www.linkedin.com/in/alexhagenah)
279305
306+
## 📆 Changelog
307+
308+
- For a detailed list of updates, fixes, and new features, check the [Changelog](CHANGELOG.md).
309+
280310
## 📚 References
281311
282312
- [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)

docs/sploitscan.1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
.TH SploitScan 1 "Version 0.10.1" "SploitScan user manual"
1+
.TH SploitScan 1 "Version 0.11.0" "SploitScan user manual"
22
.SH NAME
33
\fBSploitScan\fP - A tool to fetch and display vulnerability information and public exploits for given CVE IDs.
44
.PP

0 commit comments

Comments
 (0)