Skip to content

The main script CRIT-VULN.py will JSON fromat all the critical vulnerabilities of each Asset ID for a list of Customer IDs

Notifications You must be signed in to change notification settings

Brody-L/Critical-Vulns-Falconpy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

GET-CRIT-VULN.py

The main script GET-CRIT-VULN.py will JSON fromat all the critical vulnerabilities and the effected products of each Asset ID for a list of Customer IDs

Output Format:

{
  "<CID STRING - Parent>": [
    "<CID NAME - Parent>"
  ],
  "<CID STRING - Child 0>": [
    "<CID NAME - Child 0>",
    {
      "<AID 0>": [
        {
          "Hostname": "",
          "OS Product Name": "",
          "OS Build": "",
          "Last Login User": "",
          "Manufacturer": "",
          "Model": "",
          "Critical CVE": {
            "CVE-0000-0000": [
              "<Affected Product>"
            ]
          }
        }
      ]
    },
  ]
}

Install Falconpy and dependencies:

python3 -m pip install crowdstrike-falconpy pandas

Create a Falcon API Client with a Client ID and Secret

Place the client ID and secret in the config-empty.py file

Export Parent_Child_Report from the Falcon Flight Control Module

The report contains Spotlight Subscriber information under the Falcon Module Subscriptions column

Usage:

python CRIT-VULN.py parent_child_report_<date>.csv

GET-ACTIVE.py

Retrieves all devices that have been active over the last 30 days by customer

About

The main script CRIT-VULN.py will JSON fromat all the critical vulnerabilities of each Asset ID for a list of Customer IDs

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages