CVE Hunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs
ShodanCVE is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs. It retrieves open ports, hostnames, tags, and vulnerabilities for a given IP and fetches CVE details, including affected products and CVSS scores. Results are color-coded by severity for easy analysis.
- Fetch open ports, hostnames, and associated vulnerabilities for an IP address.
- Retrieve CVE details including severity levels.
- Color-coded output for easy identification of risk levels.
- Support for file input (
-f) and output saving (-o). - Option to display combined CVEs and open ports.
# Clone the repository
git clone https://github.com/odaysec/ShodanCVE.git
cd ShodanCVE
# Install required dependencies
pip install -r requirements.txt
# Run the tool
python shodancve.py --helppython ShodanCVE.py -hpython ShodanCVE.py --ip 192.20.1.1python ShodanCVE.py -f targets.txtpython ShodanCVE.py --ip 192.20.1.1 --cvespython ShodanCVE.py --ip 192.20.1.1 --portspython ShodanCVE.py --ip 192.20.1.1 --hostpython ShodanCVE.py --ip 192.20.1.1 --cve+portspython ShodanCVE.py --ip 192.20.1.1This tool uses data from the Shodan InternetDB and CVE Database. Credits to Shodan for their valuable security intelligence.
ShodanCVE is intended for educational and authorized security research purposes only. Unauthorized usage against systems without explicit permission is illegal.
ShodanCVE is released under the MIT License. See LICENSE for more details.