SploitScan
SploitScan is a command-line tool to search for CVE information, fetch vulnerability data, and display public exploits for given CVE IDs. It supports exporting results to JSON, CSV, or HTML formats from major cybersecurity databases.
Description
SploitScan is an efficient and easy-to-use command-line tool designed to consult CVE (Common Vulnerabilities and Exposures). Extremely important for professionals, as it allows them to implement measures that prevent the exploitation of discovered vulnerabilities. The tool is capable of exporting in a single run results for JSON and CSV formats, from the main databases of entities and organizations linked to cybersecurity, including MITER Corporation, EPSS (Exploit Prediction Scoring System), CISA KEV catalog, and Patch Priority System.
It gathers PoCs (Proof of Concepts) which is a common activity among vulnerability researchers and security professionals to reproduce the severity of vulnerabilities in controlled environments for preventive measures. SploitScan supports importing vulnerability scan files from tools like Nessus, Nexpose, OpenVAS, or Docker, making it versatile for processing existing scan data.
Professionals use it to prioritize mitigation activities based on exploit predictions, public exploits availability, and patch priorities, enhancing cybersecurity workflows.
How It Works
SploitScan queries major CVE databases including MITER, EPSS for exploit probability predictions, CISA KEV catalog, and Patch Priority System. It fetches vulnerability details and public exploits or PoCs for specified CVE IDs (format CVE-YYYY-NNNNN). Supports importing files from Nessus, Nexpose, OpenVAS, or Docker scanners, processes the data, and exports results in JSON, CSV, or HTML formats using Python libraries like requests, tabulate, and Jinja2.
Installation
sudo apt install sploitscanFlags
Examples
sploitscan -hsploitscan CVE-2023-1234sploitscan CVE-2023-1234 CVE-2023-5678sploitscan -e json CVE-2023-1234sploitscan -e csv CVE-2023-1234sploitscan -e html CVE-2023-1234sploitscan -t nessus -i scan.xmlsploitscan -t openvas -i report.xml