Python3 scripts to parse the Exploit-DB RSS Feed
Stage 1
edb_basic.py prints out base entries from the Exploit-DB RSS Atoma feed
edb_advanced.py extracts key Atoma elements such as Title, Published, Link, Attack Description and Type and Vector and parses any special characters ('[],') and stores the results in a CSV file.
edb_advanced_proxy.py supports proxy requests, extracts key Atoma elements such as Title, Published, Link, Attack Description and Type and Vector and parses any special characters ('[],') and stores the results in a CSV file.
Stage 2
The goal is to create a MISP CSV and HTML import feed by hosting the CSV file as an accessible web feed on a local server.
Make the downloaded feed accessible as a CSV or HTML file.
Edit MISP Feed
Enabled Caching Enabled Lookup Visible
Name EDB Exploits
Provider Cyber
Input Source Network
URL http://misp.user.com/EDB.html
Source Format Freetext Parsed Feed
Creator organisation Threat Intelligence
Target Event Fixed Event