A client to generate sightings for Vulnerability-Lookup from the Known Exploited Vulnerabilities (KEV) catalog.
Project description
KEVSight
A client to generate sightings for Vulnerability-Lookup from the Known Exploited Vulnerabilities (KEV) catalog.
Installation
pipx is an easy way to install and run Python applications in isolated environments. It's easy to install.
$ pipx install KEVSight
$ export KEVSight_CONFIG=~/.KEVSight/conf.py
$ cisa_kev --download-path /home/cedric/.cisa_kev/known_exploited_vulnerabilities.json download
The configuration for KEVSight should be defined in a Python file (e.g., ~/.KEVSight/conf.py
).
You must then set an environment variable (KEVSight_CONFIG
) with the full path to this file.
Usage
$ KEVSight --help
usage: KEVSight [-h] [--since SINCE]
options:
-h, --help show this help message and exit
--since SINCE Specify the number of days from today to include in the query
License
KEVSight is licensed under GNU General Public License version 3
Copyright (c) 2024 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (C) 2024 Cédric Bonhomme - https://github.com/cedricbonhomme
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file kevsight-0.1.0.tar.gz
.
File metadata
- Download URL: kevsight-0.1.0.tar.gz
- Upload date:
- Size: 15.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.8.4 CPython/3.11.4 Linux/6.1.0-28-amd64
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b2b5eb73a0fad507e604fd13f6c2ee92ca86f29e55ae07728b116c9a38180f8d |
|
MD5 | 16d4cb8f55264886aefa2ee8a6a6f64a |
|
BLAKE2b-256 | ad2816e4f7775b6317c65fbe0b99bb0829d1952ff558338c3d1408c2c4341cdf |
File details
Details for the file kevsight-0.1.0-py3-none-any.whl
.
File metadata
- Download URL: kevsight-0.1.0-py3-none-any.whl
- Upload date:
- Size: 29.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.8.4 CPython/3.11.4 Linux/6.1.0-28-amd64
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c494970d91af9e791341b770e6a683566ba7b659909a3c30a660a6fae922f0e4 |
|
MD5 | ea6b1ac5d89484897c25b157f7a9975a |
|
BLAKE2b-256 | 0556ef6f5725422a7af7208b412be9c1939fd392bd41601546e22074f6085f69 |