Skip to content

ThatNotEasy/CVE-Finder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔍 CVE Finder

CVE Finder is a lightweight Python script designed to extract and display information about Common Vulnerabilities and Exposures (CVE). It scrapes CVE details from structured HTML and presents them in a clean, readable format in the terminal. Additionally, it searches GitHub repositories to find related projects, exploits, or research for the given CVE.

✨ Features

CVE Extraction – Parses CVE ID and vulnerability description.
GitHub Repository Lookup – Finds repositories mentioning the CVE (e.g., exploits, patches, PoCs).
Easy-to-Use – Simply provide a CVE number, and the script retrieves relevant details.


🛠 Installation

1️⃣ Clone the Repository

git clone https://github.com/ThatNotEasy/CVE-Finder.git
cd CVE-Finder

2️⃣ Create a Virtual Environment

Before installing dependencies, it's recommended to use a virtual environment (venv).

Windows

python -m venv venv
venv\Scripts\activate

Linux / macOS

python3 -m venv venv
source venv/bin/activate

3️⃣ Install Dependencies

pip install -r requirements.txt

🚀 Usage

python main.py -c "CVE_NUMBER"

image

⚠️Limitations

  • Basic Finder: This script is a simple lookup tool and does not fetch live CVE updates.
  • GitHub API Rate Limits: Uses unauthenticated GitHub API calls, which may be limited for excessive use.
  • No Advanced Analysis: Only extracts information from HTML responses and performs a basic GitHub search.

About

CVE Finder - Vulnerability Lookup & GitHub Repository Search

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages