An IP to vulnerability utility
Project description
ip2vulns
An IP to vulnerabilities utility. This tool is able to retrieve information related to given IP(s). This tool takes advantage of Shodan InternetDB API.
For CVE information, this tool retrieve CVE information from a github repo nvd-json-data-feed
Disclaimer
By using this, you also agree to the term of use of the APIs used.
Installation
Install with pip
Using the following pip command to install: pip install ip2vulns
Usage
usage: ip2vulns [-h] [-i INPUT [INPUT ...]] [--cvedict CVEDICT] [-s CVSS] [-o OUT] [--nostdout] [-v]
IP 2 vulnerability tools
options:
-h, --help show this help message and exit
-i INPUT [INPUT ...], --input INPUT [INPUT ...]
Query information from https://internetdb.shodan.io/
support multiple ip and cidr, separate using space, e.g. -i 8.8.8.8 51.83.59.99 192.168.0.0/24
--cvedict CVEDICT Config CVE database integrate with go-cvedict, checkout at: https://github.com/BoxHezi/go-cvedict
-s CVSS, --cvss CVSS Enable cvss score filter, required a number
If 0 is given, targets found with no CVE information will be filtered out. And all CVEs will be checked.
When 0 is given, the process can be slow if huge amount of CVEs are founded.Not Recommend to pass 0 in.
-o OUT, --out OUT Define output file, default print to stdout
Available option: stdout (default), csv, json
For csv: please specify filename
For json: a directory out_json will be created
--nostdout Disable print result to stdout
IP with unsuccessful querying (i.e. Exception happened) will still be printed
-v, --version Print current version
Output to file
When output to csv file, please specify the filename.
For example, ip2vulns -i 1.1.1.1 -o 1.1.1.1.csv, the output file will be 1.1.1.1.csv.
When output to json file, a directory out_json will be created. Results will be stored using <ip>.json.
For example, ip2vulns -i 1.1.1.1 -o json, then a directory out_json will be created. And the output filename will be 1.1.1.1.json.
To disable print to stdout, apply --disable-stdout in command line argument
Example
ip2vulns -i <ip address> <cidr> <input file>ip2vulns -i <ip address> <cidr> <input file> -s 7echo "<ip address>" | ip2vulnsecho "<ip address>" | ip2vulns -s 7cat <input file> | ip2vulns
Use ip2vulns in Python script
from ip2vulns import ip2vulns_scan
# s => success list
# f => failure list
s, f = ip2vulns_scan("[<ip address>]") # ip address need to be passed in as a LIST
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ip2vulns-1.1.0.tar.gz.
File metadata
- Download URL: ip2vulns-1.1.0.tar.gz
- Upload date:
- Size: 12.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.1
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
33e09736bc86f3a147939e647c4d7c6cec1092fcffd58220f8ae81e84c902c06
|
|
| MD5 |
f1bf63513029017260e1f738d51ea7ec
|
|
| BLAKE2b-256 |
05ab7a6124d60925b287616d126a150f144995763debbd49a681b5cb34ff45d1
|
File details
Details for the file ip2vulns-1.1.0-py3-none-any.whl.
File metadata
- Download URL: ip2vulns-1.1.0-py3-none-any.whl
- Upload date:
- Size: 15.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.1
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fb56562854e98114aabc1b2a45a1733d1d0f5983aa6e00b69bb4618c901ee9da
|
|
| MD5 |
b2931b01a08503376311e0c57ed008c1
|
|
| BLAKE2b-256 |
52ae33e50f4d08a8709726fc1b16c0da424de3000c71e3398916f8feaa2f08bd
|