CVE Hunter is a powerful and user-friendly tool for scanning domains or IP addresses to detect vulnerabilities (CVEs). Designed for cybersecurity professionals, it provides efficient domain/IP scanning, interactive mode, and export options for results.
- Scan single or multiple domains/IP addresses.
- Export results in JSON or CSV format.
- Interactive mode for a better user experience.
- Easy-to-use CLI interface.
Follow these steps to install CVE Hunter:
┌──(rooter㉿rooter)-[/CveHunter]
└─$ git clone https://github.com/shubhamrooter/CveHunter.git
┌──(rooter㉿rooter)-[/tmp/CveHunter]
└─$ cd CveHunter
┌──(rooter㉿rooter)-[/CveHunter]
└─$ chmod +x cvehunter/cvehunter.py
┌──(rooter㉿rooter)-[/CveHunter]
└─$ pip install .
Once installed, use the following commands to run CVE Hunter:
┌──(rooter㉿rooter)-[/cvehunter]
└─$ cvehunter -h
usage: cvehunter [-h] [-d DOMAIN] [-f FILE] [-o OUTPUT] [--export {json,csv}] [--interactive]
Ultimate CVE Hunter Tool
options:
-h, --help Show this help message and exit
-d DOMAIN, --domain DOMAIN
IP address or domain to scan
-f FILE, --file FILE File containing list of domains/IPs to scan
-o OUTPUT, --output OUTPUT
Output file to store the results (e.g., result.txt)
--export {json,csv} Export results in JSON/CSV format
--interactive Run in interactive mode
cvehunter -d example.com
cvehunter -f domains.txt -o result.txt --export json
cvehunter -d example.com --export json -o results.json
cvehunter --interactive
CVE Hunter is open for contributions! Feel free to submit issues, feature requests, or pull requests to help improve the tool.
This project is licensed under the MIT License. See the LICENSE file for details.
Connect with Shubham via:
- Email: [email protected]
- LinkedIn: https://www.linkedin.com/in/shubham-tiwari09
- Twitter: https://twitter.com/shubhamtiwari_r
GitHub Repository: CVE Hunter
For queries or issues, contact @Shubhamrooter on GitHub. Special thanks to @mr-kasim-mehar for the support