Skip to content

kacperstyslo/exploit-finder

Repository files navigation

Documentation Status

Asynchronous finder of an exploit! With this script, you can scan any device that is reachable over ICMP protocol. While scanning the selected target, this script will find a sensitive information about the selected target, which will be used to find ready-made exploits and CVE. I encourage you to use the discovered vulnerabilities to improve security of the scanned device, not to break security of the scanned target.

  • Python 3.10+

On Windows:

python run_exploits_finder.py IP_V4_ADDRESS_OF_DEVICE

On Linux:

python run_exploits_finder.py IP_V4_ADDRESS_OF_DEVICE

You can also specify the number of ports you want to scan:

python run_exploits_finder.py IP_V4_ADDRESS_OF_DEVICE -p 1024

Example usage:

python run_exploits_finder.py 192.168.0.1 -p 2000
  • MAC Address detector
    This module will detect MAC address and vendor name of MAC used by the target.
  • OS name detector
    This module will detect OS used by target.
  • TCP Port scanner
    This module will discover this below information about the selected target:
    • open ports (what open ports selected target has)
    • names of services listening on these open ports
    • versions of these listening services
  • CVE scrapper
    This module will try to find a link to documents describing individual vulnerabilities discovered in the scanned target.
  • Exploit scrapper
    This module will try to find a link to exploits that can exploit discovered vulnerabilities in the scanned target.

Example scanning results