Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/5amu/pocbrowser
Scrape websites to find PoCs for CVEs
https://github.com/5amu/pocbrowser
crystal crystal-lang cve cybersecurity exploit pentesting proof-of-concept scraping security-tool security-tools vulnerability-assessment
Last synced: about 2 months ago
JSON representation
Scrape websites to find PoCs for CVEs
- Host: GitHub
- URL: https://github.com/5amu/pocbrowser
- Owner: 5amu
- License: mit
- Created: 2022-08-10T20:07:12.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-02-09T13:55:31.000Z (12 months ago)
- Last Synced: 2024-10-06T03:06:22.643Z (4 months ago)
- Topics: crystal, crystal-lang, cve, cybersecurity, exploit, pentesting, proof-of-concept, scraping, security-tool, security-tools, vulnerability-assessment
- Language: Crystal
- Homepage:
- Size: 2.07 MB
- Stars: 2
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
🔎 POC Browser 🔍A tool to find exploits for a given CVE.
---
## Very cool, but what it does?
The tool is basically a scraper, it scrapes some websites to find repositories, code or videos involving the exploitation of a [CVE id](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures). At the time of writing, it supports scraping for:
* GitHub, using [their API](https://docs.github.com/en/rest/search#search-repositories)
* CVEBase, reading from [their repository](https://github.com/cvebase/cvebase.com/)
* ExploitDB, scraping the search page
* Youtube, scraping the results page## Usage
```
$ pocbrowser --help
```## Install
```bash
pipx install git+ssh://[email protected]/5amu/pocbrowser.git
```