Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/5amu/pocbrowser
Scrape websites to find PoCs for CVEs
https://github.com/5amu/pocbrowser
crystal crystal-lang cve cybersecurity exploit pentesting proof-of-concept scraping security-tool security-tools vulnerability-assessment
Last synced: 20 days ago
JSON representation
Scrape websites to find PoCs for CVEs
- Host: GitHub
- URL: https://github.com/5amu/pocbrowser
- Owner: 5amu
- License: mit
- Created: 2022-08-10T20:07:12.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-02-09T13:55:31.000Z (9 months ago)
- Last Synced: 2024-10-06T03:06:22.643Z (about 1 month ago)
- Topics: crystal, crystal-lang, cve, cybersecurity, exploit, pentesting, proof-of-concept, scraping, security-tool, security-tools, vulnerability-assessment
- Language: Crystal
- Homepage:
- Size: 2.07 MB
- Stars: 2
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
🔎 POC Browser 🔍A tool to find exploits for a given CVE.
---
## Very cool, but what it does?
The tool is basically a scraper, it scrapes some websites to find repositories, code or videos involving the exploitation of a [CVE id](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures). At the time of writing, it supports scraping for:
* GitHub, using [their API](https://docs.github.com/en/rest/search#search-repositories)
* CVEBase, reading from [their repository](https://github.com/cvebase/cvebase.com/)
* ExploitDB, scraping the search page
* Youtube, scraping the results pageI implemented it using [Crystal](https://crystal-lang.org/) because "Why Not?"
## Usage
```
$ pocbrowser --help___ __ __ ___ ___ __ _ _ ___ ___ ___
( ,\ / \ / _) ( ,)( ,) / \ ( \/\/ )/ __)( _)( ,)
) _/( () )( (_ ) ,\ ) \ ( () ) \ / \__ \ ) _) ) \
(_) \__/ \__) (___/(_)\_) \__/ \/\/ (___/(___)(_)\_)
🔍 by 5amu (https://github.com/5amu)Usage: pocbrowser [-h|-v|-f |-m ] [CVE1 CVE2 ...]
POSITIONAL ARGUMENTS
[CVE1 CVE2 ...] Space separated list of CVEsALLOWED MODES
gh: github, cb: cvebase, yt: youtube, ed: exploitdbOPTIONAL ARGUMENTS
-f F, --file=FILE Newline separated CVE list in file
-o O, --output=OUT Output file (json)
-m M, --mode=MODE Choose one or more modes to search for CVEs
-q, --quiet Don't produce output in stdout
-v, --version Show version
-h, --help Show help
```## Install
Get it from the [release page](https://github.com/5amu/pocbrowser/releases) of this repo.