Example Usage
usage: search_vulns [-h] [-u] [--full-update] [--full-update-module MODULE_ID [MODULE_ID ...]]
[--full-install] [-a] [-f {json,txt}] [-o OUTPUT] [-q QUERY] [-c CONFIG]
[-V] [--list-modules] [--cpe-search-threshold CPE_SEARCH_THRESHOLD]
[--ignore-general-product-vulns] [--include-single-version-vulns]
[--use-created-product-ids] [--include-patched]
Search for known vulnerabilities in software -- Created by Dustin Born (ra1nb0rn)
options:
-h, --help show this help message and exit
-u, --update Download the latest version of the the local vulnerability and
software database from GitHub repo
--full-update Fully (re)build the local vulnerability and software database
--full-update-module MODULE_ID [MODULE_ID ...]
Fully (re)build the local database for the given module(s) in-place
--full-install Fully install search_vulns, including all dependencies (python
packages, system packages etc.)
-a, --artifacts Print JSON list of artifacts created during full update
-f {json,txt}, --format