Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/5amu/pocbrowser

Scrape websites to find PoCs for CVEs
https://github.com/5amu/pocbrowser

crystal crystal-lang cve cybersecurity exploit pentesting proof-of-concept scraping security-tool security-tools vulnerability-assessment

Last synced: 20 days ago
JSON representation

Scrape websites to find PoCs for CVEs

Awesome Lists containing this project

README

        




DNSHunter


🔎 POC Browser 🔍

A tool to find exploits for a given CVE.




---

## Very cool, but what it does?

The tool is basically a scraper, it scrapes some websites to find repositories, code or videos involving the exploitation of a [CVE id](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures). At the time of writing, it supports scraping for:

* GitHub, using [their API](https://docs.github.com/en/rest/search#search-repositories)
* CVEBase, reading from [their repository](https://github.com/cvebase/cvebase.com/)
* ExploitDB, scraping the search page
* Youtube, scraping the results page

I implemented it using [Crystal](https://crystal-lang.org/) because "Why Not?"

## Usage

```
$ pocbrowser --help

___ __ __ ___ ___ __ _ _ ___ ___ ___
( ,\ / \ / _) ( ,)( ,) / \ ( \/\/ )/ __)( _)( ,)
) _/( () )( (_ ) ,\ ) \ ( () ) \ / \__ \ ) _) ) \
(_) \__/ \__) (___/(_)\_) \__/ \/\/ (___/(___)(_)\_)

🔍 by 5amu (https://github.com/5amu)

Usage: pocbrowser [-h|-v|-f |-m ] [CVE1 CVE2 ...]

POSITIONAL ARGUMENTS
[CVE1 CVE2 ...] Space separated list of CVEs

ALLOWED MODES
gh: github, cb: cvebase, yt: youtube, ed: exploitdb

OPTIONAL ARGUMENTS
-f F, --file=FILE Newline separated CVE list in file
-o O, --output=OUT Output file (json)
-m M, --mode=MODE Choose one or more modes to search for CVEs
-q, --quiet Don't produce output in stdout
-v, --version Show version
-h, --help Show help
```

## Install

Get it from the [release page](https://github.com/5amu/pocbrowser/releases) of this repo.