ZDI Advisory Explorer is a Streamlit application designed to help you quickly sort and understand the types of vulnerabilities that bug bounties such as ZDI are looking for. The app allows you to filter, search, and visualize advisories, making it easier to hone in on target applications for auditing N-day and 0-day vulnerabilities.
- Filter by Year: Select multiple years to filter advisories.
- Keyword Search: Search advisories by keywords in titles and summaries.
- Saved Searches: Save your search filters and quickly apply them later.
- Bookmark Advisories: Bookmark specific advisories for quick access.
- Download Data: Download filtered advisories as CSV or Excel files.
- Visualizations: View interactive charts of the number of advisories per year and their distribution.
- Expandable Details: Expand advisories to view detailed information.
- Clickable CVE Numbers: Click on CVE numbers to view detailed information on the CVE website.
-
Clone the repository:
git clone https://github.com/jwalker/zdi_advisory_explorer.git cd zdi_advisory_explorer
-
Create and activate a virtual environment (optional but recommended):
uv venv source venv/bin/activate
-
Install the dependencies:
uv pip install -r requirements.txt
-
Run the
update_json_feeds.py
script to fetch and store the latest advisories:python update_json_feeds.py
-
Set up a cron job to run the
update_json_feeds.py
script daily to keep the data up to date. Open the crontab editor:crontab -e
-
Add the following line to schedule the script to run daily at midnight:
0 0 * * * /path/to/your/venv/bin/python /path/to/update_json_feeds.py
Replace
/path/to/your/venv/bin/python
with the path to your Python interpreter inside the virtual environment and/path/to/update_json_feeds.py
with the path to the script.
- Start the Streamlit app:
streamlit run app.py
I created ZDI Advisory Explorer to help quickly sort and understand the types of vulnerabilities that bug bounty programs, such as ZDI, are looking for. The ZDI advisory section on their website allows searching for advisories one year at a time, but provides RSS access for previous years. This tool aggregates these advisories and aids in focusing on target applications for auditing N-day and 0-day vulnerabilities.