A comprehensive tool for passive asset scanning, identifying associated CVEs, and finding publicly available proof-of-concept (POC) exploits on GitHub.
- The whole script uses the passive method to identify CVE via Shodan's free API.
- Resolves domains to IPs.
- Identifies open ports for each IP.
- Fetches CVEs for each IP.
- Retrieves POCs for identified CVEs (Supports Github currently).
- Reverse CVE to POC Lookup
- Enhanced report generation with search functionality and detailed insights.
-
Clone the repository:
git clone https://github.com/anmolksachan/CVESeeker && cd CVESeeker
-
Install the required libraries:
pip3 install -r requirements.txt
-
Ensure you have
colorama
installed for colorful terminal output:pip install colorama
-
One line installer:
git clone https://github.com/anmolksachan/CVESeeker && cd CVESeeker && pip3 install -r requirements.txt && echo "We are ready to seek sailor! " && python3 cveSeeker.py
$ python3 cveSeeker.py --file <input_file> --project <project_name>
--file: Input file containing domains / IPs (one per line).
--project: Project name for storing results.
-cve CVE-ID CVE ID for fetching POCs
This project is licensed - see the LICENSE file for details.
Feel free to enhance, modify, or contribute to this script to suit your needs and explore more security-related projects!
Give me a Star in the repository or follow me @FR13ND0x7F , that's enough for me :P
Shoot my DM : @FR13ND0x7F
Coded with ❤️ by Anmol K Sachan (@FR13ND0x7F)