Ultimate CVE Hunter Tool: A Comprehensive Guide
Cybersecurity professionals and enthusiasts often face the challenge of identifying vulnerabilities within networks or systems. The Ultimate CVE Hunter Tool, built with Python, offers a robust solution to tackle this challenge by integrating domain/IP scanning, CVE fetching, exploit verification, and data exportation. This blog provides a beginner-friendly walkthrough of the tool’s features and capabilities.
Key Features
- Domain/IP Resolution
- Converts domain names to IP addresses.
- Logs unresolvable domains for further analysis.
2. Shodan Integration
- Fetches data from Shodan’s InternetDB API for given IPs.
- Retrieves hostnames, open ports, and associated vulnerabilities (CVEs).
3. CVE Analysis
- Automatically fetches CVE details (base score, severity, and description) from the NVD (National Vulnerability Database).
- Verifies exploit availability for CVEs via Exploit-DB.
4. Rich Visualization
- Utilizes the Rich library for console-based tables and banners.
- Displays vulnerabilities and system data in an organized, aesthetic format.
5. Data Exportation
- Exports results to JSON or CSV formats for offline analysis.
6. Interactive and Batch Modes
- Interactive mode for single target analysis.
- Bulk scanning support through file input.
How the Tool Works
1. Banner Display
The tool welcomes users with a visually appealing banner, created using the Rich
library. This sets a professional tone and includes versioning details.
2. Domain/IP Resolution
Input can be in the form of domain names or raw IP addresses. Domains are resolved to IPs using the socket
library, ensuring compatibility with Shodan API queries.
3. Shodan Data Fetching
Each IP address is queried against Shodan’s InternetDB API, fetching:
- Open ports
- Hostnames
- Associated CVEs
4. CVE Analysis
The tool uses BeautifulSoup to scrape details from the NVD:
- Base Score: Highlights the severity level.
- Severity: Categorized as Critical, High, Medium, or Low.
- Description: Provides insights into the vulnerability.
- Exploit Availability: Checks Exploit-DB for proof-of-concept exploits.
5. Rich Table Visualization
Vulnerabilities and related details are displayed in a rich table format, with color-coded columns for better readability:
- CVE ID
- Base Score
- Severity
- Description
- Exploit Status
6. Data Exportation
Results can be saved in JSON or CSV format, enabling further offline analysis or reporting.
How to Install and Use CveHunter
Clone the Repository
First, you need to clone the CveHunter repository from GitHub. Open a terminal and run the following command:
git clone https://github.com/shubhamrooter/CveHunter.git
Navigate to the Project Directory
After cloning the repository, change into the CveHunter directory:
cd CveHunter
Make the Script Executable
Before you can run the tool, you need to make the cvehunter.py
script executable:
chmod +x cvehunter/cvehunter.py
Install the Tool
Now, install the required dependencies using pip:
pip install .
Run the Tool
After installation, you can use the tool to scan domains or IPs for vulnerabilities. To check its usage, you can run:
cvehunter -h
Tool Features
The CveHunter tool provides various features to help you identify CVEs (Common Vulnerabilities and Exposures) for a given domain or IP address:
- Resolve Domain/IPs: The tool can resolve domains to IP addresses and vice versa.
- Fetch CVE Details: Retrieve detailed information about CVEs including severity, description, and base score.
- Exploit Availability: Check whether there are known exploits for a given CVE.
- Interactive Mode: Optionally, run the tool in interactive mode for a more hands-on approach.
Best regards,
Shubham Tiwari (Rooter)
Connect with Shubham via:
- Email: info@shubhamrooter.com
- LinkedIn: https://www.linkedin.com/in/shubham-tiwari09
- Twitter: https://twitter.com/shubhamtiwari_r
Happy bug hunting! 🐞✨