1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
|
Source: sploitscan
Section: misc
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com>
Rules-Requires-Root: no
Build-Depends: debhelper-compat (= 13),
dh-sequence-python3,
pybuild-plugin-pyproject,
python3-all,
python3-jinja2,
python3-openai,
python3-poetry,
python3-requests,
python3-setuptools
Standards-Version: 4.7.0
Homepage: https://github.com/xaitax/SploitScan
Vcs-Browser: https://salsa.debian.org/pkg-security-team/sploitscan
Vcs-Git: https://salsa.debian.org/pkg-security-team/sploitscan.git
Package: sploitscan
Architecture: all
Depends: python3-tabulate,
${misc:Depends},
${python3:Depends}
Suggests: python3-pygments
Description: Search for CVE information
SploitScan is an efficient and easy-to-use command-line tool designed to
consult CVE (Common Vulnerabilities and Exposures).
Extremely important for professionals, as it allows them to implement
measures that prevent the exploitation of discovered vulnerabilities.
.
Tool is capable of exporting in a single run results for JSON and CSV
formats, from the main databases of entities and organizations linked
to cybersecurity:
- MITER Corporation. non-profit organization that provides technical
solutions to critical security issue
- EPSS (Exploit Prediction Scoring System) is a system that aims to
predict the probability of a specific vulnerability, helping organizations
prioritize their mitigation activities.
- Gather PoCs (Proof of Concepts) Collecting PoCs is a common activity
among vulnerability researchers and security professionals, who reproduce
the severity of vulnerabilities in a controlled environment, aiming to
take preventive measures.
- CISA Infrastructure Security Agency - responsible for keeping Known
Exploited Vulnerabilities Catalog (KEV) updated.
- Capable of interacting with the Patch Priority System, responsible for
evaluating and assigning a patch priority rating based on several factors,
including the availability of public exploits.
|