/VulnFinder

Detects technologies used on a website and their versions and searches Exploit-DB for any known vulnerabilities.

Primary LanguagePythonMIT LicenseMIT

VulnFinder

VulnFinder is Python command-line tool that'll save ye time and effort by automatin' the process of detecting the technologies and versions used on a website using Wappalyzer. But that be not all, VulnFinder is also checkin' the infamous Exploit-DB for any known vulnerabilities associated with the detected technologies.

With VulnFinder in yer arsenal, you won't have to waste time manually checking for CVE's and corresponding proof-of-concepts. It'll do all the heavy liftin' for you, allowing you to focus on more important things!

Installation

There are few steps to prepare VulnFinder.

  1. Install Wappalyzer dependencies: Git, Node.js 14+, Yarn.

  2. Clone VulnFinder repository:

git clone https://github.com/Hacking-Notes/VulnFinder
  1. Prepare Wappalyzer:
cd VulnFinder/api/wappalyzer
yarn install
yarn run link
  1. Install dependencies:
cd ../../
pip3 install -r requrements.txt
  1. Edit tokens.json file, add your GitHub and NVD tokens here.
  2. Run VulnFinderr:
python3 VulnFinder.py [arguments] <url/host>

Credit

We want to give a big shoutout to the original code creator for laying the foundation!

Disclaimer

The tool provided on this GitHub page is intended for educational and research purposes only. The creators and maintainers of this tool are not responsible for any misuse or illegal use of the tool. It is the responsibility of the users to ensure that they comply with all applicable laws and regulations while using the tool.


imageă…¤Contact Me: Discord --> LXC#3100