CVEpwn
CVEpwn is a python tool designed to search for exploits related to CVE vulnerabilities across multiple platforms like GitHub, ExploitDB, and CXSecurity. It helps security professionals and researchers find potential exploits for discovered vulnerabilities.
Install / Use
/learn @jbonagura/CVEpwnREADME
CVEpwn - CVE Exploit Finder
CVEpwn is a security tool designed to search for exploits related to CVE vulnerabilities across multiple platforms like ExploitDB, CXSecurity, and GitHub. It assists security professionals and researchers by identifying and gathering potential exploits for discovered vulnerabilities based on specific keywords or CVE identifiers.
Features
-
CVE Search: Search and fetch data related to NIST CVEs.
-
GitHub Repositories: Look for exploits on GitHub repositories that could potentially be associated with vulnerabilities.
-
ExploitDB Search: Query ExploitDB for exploits based on CVE IDs or keywords, specifically for critical vulnerabilities.
-
CXSecurity Scraping: Scrape CXSecurity for high-severity vulnerabilities using a specific keyword.
-
Output: Store the results in
.txtand.htmlfiles, with detailed exploit descriptions, links, and more. -
Interactive Interface: The tool interacts with the user, asking for keywords, CVE IDs, and preferences on how to search and retrieve exploit data.
Requirements (you can also use the requirements.txt)
- Python 3.x
- Required libraries:
requestsbeautifulsoup4urllibdatetime
Install required libraries using pip:
pip install requests beautifulsoup4
Setup and Usage
-
Clone or Download the Repository: Clone or download the
CVEpwnrepository to your local machine. -
Run the Script: Navigate to the directory where the script is located and execute:
python3 cvepwn.py -
Input Prompts: The script will prompt you to input:
- A keyword to search for CVEs on NIST.
- Whether you want to search for GitHub repositories related to the exploits.
- Whether you want to search for Critical CVEs or Custom Exploits in ExploitDB.
- If you want to scrape CXSecurity for high-severity exploits related to the keyword.
-
Directory Structure:
- The script will create a folder named after the keyword and timestamp (e.g.,
apache_2025-03-02_10-30-15) to store the results. - It will create
.htmland.txtfiles for ExploitDB and CXSecurity, containing detailed data for each found exploit.
- The script will create a folder named after the keyword and timestamp (e.g.,
-
Results Format:
-
CVE results will include:****
- CVE ID: The CVE identifier (e.g., CVE-2023-XXXX).
- Title: A short title or description of the CVE.
- Description: A detailed description of what the CVE addresses.
- Published: The date when the CVE was published.
- Last Modified: The date when the CVE entry was last updated.
- CVSS Score: The severity score given to the vulnerability, such as "Critical" or "High."
- References: A URL to further details or official resources related to the CVE.
-
Github results will include:
- Repository Name
- Description
- URL
-
ExploitDB results will include:
- CVE ID
- Description of the exploit
- Download links (if available)
-
CXSecurity results will include:
- Title and link to the exploit
- Severity level
- Description of the vulnerability
-
Example Workflow
-
Initial Keyword Input: The script will ask you for a keyword (e.g.,
apache,nginx, etc.) to search for CVEs.Please enter the keyword to search for CVEs on NIST: apache -
GitHub Repositories (Optional): After getting the CVE data, the script will ask if you want to search for Critical CVEs on Github
Do you want to search for CRITICAL CVEs exploits on Github? Yes(y) - No(n) - Keyword(k): -
ExploitDB (Optional): The script will ask if you want to search for Critical CVEs:
Do you want to search for CRITICAL CVEs exploits on ExploitDB? Yes(y) - No(n) - Keyword(k): -
CXSecurity Scraping (Optional): After handling ExploitDB, it will ask if you want to scrape CXSecurity for high-severity exploits: On this case a keywork and a number of pages to scrap will be asked, since the CXSecurity don't necessarilly works with CVE number or products version. Also the classification is only until High.
Do you want to search for High exploits on CXSecurity? Yes(y) - No(n) -
Output Files:
- CVE Data:
CVE_exploits_apache_2025-03-02_10-30-15.txtandCVE_exploits_apache_2025-03-02_10-30-15.html - Github Results:
GitHub_exploits_apache_2025-03-02_10-30-15.txtandGitHub_exploits_apache_2025-03-02_10-30-15.html - ExploitDB Results:
ExploitDB_critical_exploits_apache_2025-03-02_10-30-15.txtandExploitDB_critical_exploits_apache_2025-03-02_10-30-15.html - CXSecurity Results:
CXSecurity_apache_2025-03-02_10-30-15.txtandCXSecurity_apache_2025-03-02_10-30-15.html
- CVE Data:
License
This project is licensed under the MIT License - see the LICENSE file for details.
Disclaimer
This tool is intended for ethical research and penetration testing purposes only. The author is not responsible for any misuse or illegal activities involving this tool.
Related Skills
clearshot
Structured screenshot analysis for UI implementation and critique. Analyzes every UI screenshot with a 5×5 spatial grid, full element inventory, and design system extraction — facts and taste together, every time. Escalates to full implementation blueprint when building. Trigger on any digital interface image file (png, jpg, gif, webp — websites, apps, dashboards, mockups, wireframes) or commands like 'analyse this screenshot,' 'rebuild this,' 'match this design,' 'clone this.' Skip for non-UI images (photos, memes, charts) unless the user explicitly wants to build a UI from them. Does NOT trigger on HTML source code, CSS, SVGs, or any code pasted as text.
ui-ux-pro-max-skill
61.7kAn AI SKILL that provide design intelligence for building professional UI/UX multiple platforms
ui-ux-pro-max-skill
61.7kAn AI SKILL that provide design intelligence for building professional UI/UX multiple platforms
onlook
25.1kThe Cursor for Designers • An Open-Source AI-First Design tool • Visually build, style, and edit your React App with AI
