╔══════════════════════════════════════════════════════════════════════════════╗
║ ║
║ ██████╗██╗ ██╗███████╗ ███████╗██╗ ██╗██████╗ ██╗ ██████╗ ║
║ ██╔════╝██║ ██║██╔════╝ ██╔════╝╚██╗██╔╝██╔══██╗██║ ██╔═══██╗ ║
║ ██║ ██║ ██║█████╗ █████╗ ╚███╔╝ ██████╔╝██║ ██║ ██║ ║
║ ██║ ╚██╗ ██╔╝██╔══╝ ██╔══╝ ██╔██╗ ██╔═══╝ ██║ ██║ ██║ ║
║ ╚██████╗ ╚████╔╝ ███████╗ ███████╗██╔╝ ██╗██║ ███████╗╚██████╔╝ ║
║ ╚═════╝ ╚═══╝ ╚══════╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚══════╝ ╚═════╝ ║
║ ║
║ Exploit Research & CVE Scanner Toolkit ║
║ ║
╚══════════════════════════════════════════════════════════════════════════════╝
A comprehensive toolkit for researching, scanning, and analyzing high-severity CVEs (CVSS >= 8.5) across multiple technologies.
CVE-Exploits/
├── README.md # This file
├── cve-scanner/ # CVE Scanner Toolkit
│ ├── README.md # Detailed scanner documentation
│ ├── cve-scanner.py # Modular scanner (CLI)
│ ├── cve-scanner-unified.py # Unified scanner (single file)
│ └── scan-*.py # Individual technology scanners
└── exploits/ # CVE-specific exploit research
└── [CVE-ID]/ # Individual CVE directories
├── README.md # CVE details and analysis
└── exploit.py # Proof-of-concept exploit
<|tool▁calls▁begin|><|tool▁call▁begin|> run_terminal_cmd
Scan for high-severity CVEs across 9 technologies:
cd cve-scanner
python3 cve-scanner.py react # Scan React CVEs
python3 cve-scanner.py python # Scan Python framework CVEs
python3 cve-scanner.py java # Scan Java framework CVEs
# ... see cve-scanner/README.md for all optionsEach CVE directory contains:
- README.md - Vulnerability details, affected versions, and mitigation
- exploit.py - Proof-of-concept exploit code
- Multi-Technology CVE Scanning - React, Python, .NET, Laravel, Java, Node.js, Go, Rust, C/C++
- High-Severity Focus - Automatically filters CVEs with CVSS score >= 8.5
- Framework-Specific - Targets popular frameworks and libraries
- Exploit Research - Proof-of-concept exploits for critical vulnerabilities
- Comprehensive Documentation - Detailed analysis and mitigation guidance
- CVE Scanner Documentation - Complete guide to the CVE scanner
- Individual CVE READMEs - Detailed vulnerability analysis
This project is for educational and authorized security testing purposes only.
- Only test systems you own or have explicit written permission to test
- Unauthorized testing is illegal and unethical
- The authors are not responsible for any misuse of this code
Educational use only. Use responsibly and ethically.
For detailed documentation, see cve-scanner/README.md