Automatically detect technologies, search CVE databases, and confirm vulnerabilities with Nuclei — all in one command.
CVE Hunter is an open-source automated CVE discovery tool designed for bug bounty hunters and penetration testers. It fingerprints technologies running on a target, queries public CVE databases (NVD/NIST and circl.lu), and confirms exploitability with rate-limited Nuclei templates — producing structured JSON output with CVSS scores and severity ratings.
Feature Description Technology Detection Fingerprints via httpx, HTTP headers (Server, X-Powered-By), and CMS paths CVE Database Search Queries NVD 2.0 API and circl.lu for CVE IDs, CVSS scores, and descriptions Nuclei CVE Scanning Runs rate-limited CVE templates at medium/high/critical severity Exposed Config Detection Probes for leaked .env,env.js, and similar sensitive config filesJSON Output Saves findings with CVSS scores and severity ratings for easy triage
- Detect technologies — probes HTTP headers, runs httpx tech detection, and checks CMS fingerprint paths (
/wp-login.php,/administrator/, etc.)
- Search CVE databases — queries the NVD 2.0 API and circl.lu for each detected technology, returning CVE IDs, CVSS scores, and descriptions
- Run Nuclei CVE templates — scans the target with nuclei's
cvetag at medium+ severity
Check exposed configs — probes for common config file paths (
/.env,/env.js, etc.)Results are saved to a
findings/<domain>/cves/directory as JSON and text files.
- Python 3.6+
- httpx
- nuclei
curl
No Python dependencies beyond the standard library.
git clone https://github.com/shuvonsec/cve-hunter.git cd cve-hunter
# Scan a single domain python3 cve_hunter.py example.com # Use existing recon data python3 cve_hunter.py example.com --recon-dir /path/to/recon/example.com
================================================== CVE Hunt Summary — example.com ================================================== Technologies detected: 5 CVEs from databases: 12 Confirmed by nuclei: 1 HIGH/CRITICAL CVEs (3): - CVE-2024-XXXXX (CVSS 9.8) [nginx/1.18.0] ... ==================================================Findings are organized under
findings/<domain>/cves/as JSON and.txtfiles.
MIT — made with love for the bug bounty community.
shuvonsec/cve-hunter
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|