There is a CVE is a pentesting tool that leverages
to quickly identify vulnerabilities in internet-connected devices. It helps security professionals efficiently detect and assess security flaws. Additionally, it integrates
for exploit searching and uses the
database to find relevant exploits.
Interactive Menu : Scanning an IP address or URL and searching for exploits.
Shodan Integration : Quickly retrieve information about an IP address including open ports and CVEs.
Exploit Search : Enter a CVE ID or other identifiers to find relevant exploits using searchsploit with the exploit-db database,and Metasploit.
For Linux Users: TIAC can now be installed easily via pip:
pip install there-is-a-cve
-
Clone the repository (if you prefer manual installation):
git clone /~https://github.com/activiste/there-is-a-cve.git
-
Navigate to the project directory:
cd there-is-a-cve
-
Install requirements:
pip install -r requirements.txt
-
Run the tool:
python main.py
If `searchsploit`, `exploitdb`, and Metasploit are not installed when you run the script, it will automatically install the necessary dependencies and clone the `exploitdb` repository for you. This ensures that all the required tools are available without any additional setup.
The next update will contain functionality to exploit vulnerabilities found directly in the tool.
Note for Windows users: You may encounter issues running this tool on Windows. It is recommended to use a Linux virtual machine to ensure full functionality.