CVE Tanuki Scribe is a Python tool that automates the retrieval of cybersecurity intelligence data related to known vulnerabilities (CVE). Its main function is to collect, process, and send this data to Fennec, a service it integrates with to enhance its knowledge base.
- Automatic download of CVE data from cybersecurity intelligence sources on the internet.
- Processing and formatting of data for integration with Fennec.
- Support for scheduled and automated execution.
- Detailed logging of activities and errors for auditing and debugging.
- Python 3.8 or higher
- Dependencies specified in
requirements.txt
- Clone the repository:
git clone https://github.com/YourUser/CVE-Tanuki-Scribe.git cd CVE-Tanuki-Scribe
- Create a virtual environment (optional but recommended):
python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate
- Install dependencies:
pip install -r requirements.txt
To manually run the tool:
python main.py
If you want to set up periodic execution, you can use cron
on Linux or Task Scheduler
on Windows.
This project is distributed under the AGPL license.
For questions or suggestions, open an issue in the repository or contact us at [email protected]
.