CVE Hunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs
ShodanCVE is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs. It retrieves open ports, hostnames, tags, and vulnerabilities for a given IP and fetches CVE details, including affected products and CVSS scores. Results are color-coded by severity for easy analysis.
- Fetch open ports, hostnames, and associated vulnerabilities for an IP address.
- Retrieve CVE details including severity levels.
- Color-coded output for easy identification of risk levels.
- Support for file input (
-f
) and output saving (-o
). - Option to display combined CVEs and open ports.
# Clone the repository
git clone https://github.com/odaysec/ShodanCVE.git
cd ShodanCVE
# Install required dependencies
pip install -r requirements.txt
# Run the tool
python shodancve.py --help
python ShodanCVE.py -h
python ShodanCVE.py --ip 192.20.1.1
python ShodanCVE.py -f targets.txt
python ShodanCVE.py --ip 192.20.1.1 --cves
python ShodanCVE.py --ip 192.20.1.1 --ports
python ShodanCVE.py --ip 192.20.1.1 --host
python ShodanCVE.py --ip 192.20.1.1 --cve+ports
python ShodanCVE.py --ip 192.20.1.1
This tool uses data from the Shodan InternetDB and CVE Database. Credits to Shodan for their valuable security intelligence.
ShodanCVE is intended for educational and authorized security research purposes only. Unauthorized usage against systems without explicit permission is illegal.
ShodanCVE is released under the MIT License. See LICENSE
for more details.