ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β ββββββββββ βββββββββββ βββββββββββ ββββββββββ βββ βββββββ β
β βββββββββββ βββββββββββ βββββββββββββββββββββββββββ βββββββββ β
β βββ βββ βββββββββ ββββββ ββββββ βββββββββββ βββ βββ β
β βββ ββββ ββββββββββ ββββββ ββββββ βββββββ βββ βββ βββ β
β ββββββββ βββββββ ββββββββ ββββββββββββ ββββββ βββββββββββββββββ β
β βββββββ βββββ ββββββββ βββββββββββ ββββββ ββββββββ βββββββ β
β β
β Exploit Research & CVE Scanner Toolkit β
β β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
A comprehensive toolkit for researching, scanning, and analyzing high-severity CVEs (CVSS >= 8.5) across multiple technologies.
CVE-Exploits/
βββ README.md # This file
βββ cve-scanner/ # CVE Scanner Toolkit
β βββ README.md # Detailed scanner documentation
β βββ cve-scanner.py # Modular scanner (CLI)
β βββ cve-scanner-unified.py # Unified scanner (single file)
β βββ scan-*.py # Individual technology scanners
βββ exploits/ # CVE-specific exploit research
βββ [CVE-ID]/ # Individual CVE directories
βββ README.md # CVE details and analysis
βββ exploit.py # Proof-of-concept exploit
<ο½toolβcallsβbeginο½><ο½toolβcallβbeginο½> run_terminal_cmd
Scan for high-severity CVEs across 9 technologies:
cd cve-scanner
python3 cve-scanner.py react # Scan React CVEs
python3 cve-scanner.py python # Scan Python framework CVEs
python3 cve-scanner.py java # Scan Java framework CVEs
# ... see cve-scanner/README.md for all optionsEach CVE directory contains:
- README.md - Vulnerability details, affected versions, and mitigation
- exploit.py - Proof-of-concept exploit code
- Multi-Technology CVE Scanning - React, Python, .NET, Laravel, Java, Node.js, Go, Rust, C/C++
- High-Severity Focus - Automatically filters CVEs with CVSS score >= 8.5
- Framework-Specific - Targets popular frameworks and libraries
- Exploit Research - Proof-of-concept exploits for critical vulnerabilities
- Comprehensive Documentation - Detailed analysis and mitigation guidance
- CVE Scanner Documentation - Complete guide to the CVE scanner
- Individual CVE READMEs - Detailed vulnerability analysis
This project is for educational and authorized security testing purposes only.
- Only test systems you own or have explicit written permission to test
- Unauthorized testing is illegal and unethical
- The authors are not responsible for any misuse of this code
Educational use only. Use responsibly and ethically.
For detailed documentation, see cve-scanner/README.md