Skip to content

Xploit0 is a powerful security tool designed to scan and analyze all dependencies present in your repository, ensuring your digital infrastructure stays safe and secure.

Notifications You must be signed in to change notification settings

kushu30/Xploit0

Repository files navigation

Xploit0 - Dependency Scanner & Security Analysis Tool

Logo

Xploit0 is a powerful security tool designed to scan and analyze all dependencies present in your repository, ensuring your digital infrastructure stays safe and secure. It helps organizations identify vulnerabilities, track CVEs (Common Vulnerabilities and Exposures), and predict potential security risks using advanced machine learning models. Xploit0 is ideal for keeping your systems protected by continuously evaluating your software’s dependencies.


Steps to Set Up and Run Xploit0

1. Set Up a Virtual Environment

Start by creating a virtual environment named xenv to isolate your project’s dependencies:

python -m venv xenv

OR

python3 -m venv xenv

Activate the virtual environment:

  • On Windows:
.\xenv\Scripts\activate
  • On macOS/Linux:
source xenv/bin/activate

2. Install Dependencies

Once the virtual environment is activated, install all the necessary dependencies from the requirements.txt file:

pip install -r requirements.txt

3. Run the Security Analysis

To start the security analysis, run the run.py script. This script will perform the following steps in sequence:

  1. Dependency Scanning: Runs depscan.py to scan all dependencies in your project.
  2. CVE Data Fetching: Fetches CVE data using cvefetch.py.
  3. CVE Data Processing: Processes the fetched CVE data with cvedata.py.
  4. Data Preprocessing: Prepares the data using preproscsv.py.
  5. Model Training: Trains a machine learning model to predict vulnerabilities with modeltrain.py.
  6. Vulnerability Prediction: Runs the trained model to predict potential vulnerabilities with predict.py.

To run the analysis, use the following command:

python run.py

OR

python3 run.py

Each script will execute in order, and the output will be saved in logs for later review.

4. View the Dashboard

Once the analysis is complete, run the following command to launch the Streamlit dashboard, which provides detailed insights into the vulnerabilities detected during the analysis:

streamlit run dashboard.py

The dashboard will open in your browser at:

http://localhost:8501

The interactive dashboard will display:

  • Detected vulnerabilities
  • CVE data
  • Model predictions
  • And much more!!

5. Check Logs and Reports

After running the analysis, you can find additional information in the following directories:

  • Logs: Detailed logs of each script execution (with timestamps and status) will be saved in the logs directory.
  • Reports: A comprehensive analysis report will be generated and saved in the analysis_results directory.

6. Stopping the Analysis and Dashboard

To stop the analysis or the dashboard, simply terminate the process using CTRL+C in the terminal.


Contributors


About

Xploit0 is a powerful security tool designed to scan and analyze all dependencies present in your repository, ensuring your digital infrastructure stays safe and secure.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages