Contents
- Free software: MIT license
- Documentation: https://exploit-finder.readthedocs.io/en/1.0.0/
Asynchronous finder of an exploit! With this script, you can scan any device that is reachable over ICMP protocol. While scanning the selected target, this script will find a sensitive information about the selected target, which will be used to find ready-made exploits and CVE. I encourage you to use the discovered vulnerabilities to improve security of the scanned device, not to break security of the scanned target.
- Python 3.10+
On Windows:
python run_exploits_finder.py IP_V4_ADDRESS_OF_DEVICE
On Linux:
python run_exploits_finder.py IP_V4_ADDRESS_OF_DEVICE
You can also specify the number of ports you want to scan:
python run_exploits_finder.py IP_V4_ADDRESS_OF_DEVICE -p 1024
Example usage:
python run_exploits_finder.py 192.168.0.1 -p 2000
- MAC Address detector
- This module will detect MAC address and vendor name of MAC used by the target.
- OS name detector
- This module will detect OS used by target.
- TCP Port scanner
- This module will discover this below information about the selected target:
- open ports (what open ports selected target has)
- names of services listening on these open ports
- versions of these listening services
- CVE scrapper
- This module will try to find a link to documents describing individual vulnerabilities discovered in the scanned target.
- Exploit scrapper
- This module will try to find a link to exploits that can exploit discovered vulnerabilities in the scanned target.