Skip to content

Explore vulnerabilities with the lightweight Java CLI tool, ExploitDB. This tool simplifies the process of scraping and exporting data from Exploit-DB, making it essential for security researchers and response teams. πŸ™πŸ’»

License

Notifications You must be signed in to change notification settings

Shreyashis15/exploitdb

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

22 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ExploitDB: A Lightweight Java CLI Tool for Vulnerability Data

Java CLI Tool ExploitDB Releases

Welcome to the ExploitDB repository! This project offers a lightweight Java Command Line Interface (CLI) tool designed for scraping, displaying, and exporting vulnerability data from Exploit-DB. With this tool, you can easily access and manage security vulnerabilities in a straightforward manner.

Table of Contents

Features

  • Lightweight: The tool is designed to be efficient and easy to use, requiring minimal resources.
  • Data Scraping: Automatically scrape vulnerability data from Exploit-DB.
  • Data Display: View the scraped data in a clear and organized format.
  • Data Export: Export the data to various formats for further analysis.
  • Cross-Platform: Runs on any system that supports Java.

Installation

To get started with ExploitDB, you need to download the latest release. Visit the Releases section to find the latest version. Download the appropriate file and execute it on your machine.

Prerequisites

  • Java 8 or higher installed on your system.
  • Basic knowledge of command-line operations.

Steps to Install

  1. Download the Latest Release: Go to the Releases section and download the latest version.
  2. Extract the Files: Unzip the downloaded file to your preferred directory.
  3. Run the Tool: Open your command line interface and navigate to the extracted directory. Use the command java -jar exploitdb.jar to run the tool.

Usage

After installation, you can start using ExploitDB. Here are some basic commands to get you started:

Basic Commands

  • Scrape Data: To scrape vulnerability data, use the command:

    java -jar exploitdb.jar scrape
    
  • Display Data: To display the scraped data, use:

    java -jar exploitdb.jar display
    
  • Export Data: To export the data to a CSV file, use:

    java -jar exploitdb.jar export --format csv
    

Advanced Options

  • Filter by Date: You can filter vulnerabilities by date using:

    java -jar exploitdb.jar scrape --date YYYY-MM-DD
    
  • Search by Keyword: To search for specific vulnerabilities, use:

    java -jar exploitdb.jar search --keyword <your-keyword>
    

Example Workflow

  1. Scrape Data: Start by scraping the latest vulnerabilities.

    java -jar exploitdb.jar scrape
    
  2. Display the Results: View the scraped data in your console.

    java -jar exploitdb.jar display
    
  3. Export for Analysis: Finally, export the data for further analysis.

    java -jar exploitdb.jar export --format csv
    

Topics

This repository covers a wide range of topics related to cybersecurity and vulnerability management. Here are some key topics:

  • China: Focus on cybersecurity issues relevant to China.
  • Chinese: Tools and resources in the Chinese language.
  • CTKQiang: Contributions from the CTKQiang community.
  • Cybers: General cybersecurity practices and tools.
  • Cybersecurity: Best practices and tools for securing systems.
  • Database: Management of vulnerability databases.
  • Exploit: Techniques and tools for exploiting vulnerabilities.
  • ExploitDB: Information specific to the Exploit-DB database.
  • HackerRank: Challenges related to security and vulnerability.
  • Java: Development and usage of Java-based tools.
  • Security: Overall security practices.
  • Vulnerability: Understanding and managing vulnerabilities.
  • Web Crawling: Techniques for scraping data from the web.
  • Web Scraping: Tools and methods for extracting data from websites.

Contributing

We welcome contributions to ExploitDB! If you have ideas, bug fixes, or new features, please follow these steps:

  1. Fork the Repository: Click on the "Fork" button at the top right corner of the repository page.
  2. Clone Your Fork: Use the command:
    git clone https://github.com/your-username/exploitdb.git
    
  3. Create a Branch: Create a new branch for your changes:
    git checkout -b feature/your-feature-name
    
  4. Make Your Changes: Implement your changes and commit them.
  5. Push to Your Fork: Push your changes back to your fork:
    git push origin feature/your-feature-name
    
  6. Open a Pull Request: Go to the original repository and open a pull request.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Contact

For questions or feedback, feel free to reach out:

Thank you for checking out ExploitDB! We hope this tool helps you manage and understand vulnerabilities more effectively. For the latest updates and releases, always check the Releases section.

About

Explore vulnerabilities with the lightweight Java CLI tool, ExploitDB. This tool simplifies the process of scraping and exporting data from Exploit-DB, making it essential for security researchers and response teams. πŸ™πŸ’»

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published