Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

A client-server application for CVE analysis and exploit detection with bilingual support, detailed reports, and a modern web interface.

License

NotificationsYou must be signed in to change notification settings

cansolele/exploit-seek

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

66 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exploit Seek Logo

🔍 Exploit Seek

A client-server application for comprehensive CVE analysis, exploit detection and vulnerability assessment. The system provides a modern web interface with powerful features to aggregate data from multiple trusted sources, helping security professionals evaluate risks, detect available exploits and determine patching priorities through detailed analysis and reporting capabilities.

Installation GuideFeaturesExamplesRoadmap

Dashboard Screenshot

📋 Table of Contents

Click to expand

🎯 Overview

Exploit Seek is a comprehensive client-server application designed to analyze CVE vulnerabilities and detect available exploits. The system features an intuitive web interface with bilingual support, customizable themes, and real-time analysis tracking. It collects and processes data from multiple trusted sources, including exploit databases, security research repositories, and vulnerability intelligence platforms, helping security professionals assess exploitation risks, identify public exploits, and generate detailed analytical reports.

✨ Features

Web Interface Features

  • Dark/Light theme support for comfortable work at any time
  • Bilingual interface (English/Russian)
  • Real-time analysis progress tracking
  • File history with quick access to previous reports
  • User-friendly settings management:
    • Server configuration
    • API keys management
    • Proxy configuration (HTTP/HTTPS support with authentication)
    • Language selection
    • Theme preferences
  • Secure authentication system

CVE Analysis & Exploit Detection

  • Comprehensive vulnerability assessment using CVSS scoring system
  • Exploitation probability evaluation through EPSS
  • Public exploit detection from multiple sources:
    • ExploitDB repository scanning
    • GitHub security research monitoring
    • VulnCheck intelligence integration
  • Integration with CISA Known Exploited Vulnerabilities (KEV) catalog
  • Nuclei template matching for vulnerability verification
  • Advanced patching priority assessment (A+ to D rating) based on:
    • CVSS base scores
    • EPSS probability
    • Public exploit availability
    • Presence in CISA KEV catalog

Input Processing

  • Multiple vulnerability scanner format support:
    • REDCheck reports
    • Nmap Vulners output
    • Custom XML formats
  • Direct CVE list input
  • PDF report analysis
  • Plain text file processing

Report Generation

  • Detailed Excel reports with:
    • Summary statistics
    • Color-coded priority indicators
    • Data filtering capabilities
    • Multiple sheets for exploits and references
  • HTML report generation with interactive elements
  • Bilingual report support (English/Russian)

📊 Examples

View sample reports and outputs in our examples directory:

Excel Report ExampleExcel Report Example

Download sample Excel report:Exploit Seek Report.xlsx

HTML Report ExampleHTML Report Example

View sample HTML report:Exploit Seek Report.html

Application ScreenshotApplicationSettings

🚀 Installation

🐋 Docker Installation (Recommended)

# Clone repositorygit clone https://github.com/cansolele/exploit-seek.gitcd exploit-seek# Build and start containersdocker-compose build --no-cachedocker-compose up -d# The server will be available at http://0.0.0.0:5000# The client will be available at http://0.0.0.0:8080

🔧 Manual Installation

Server Setup
  1. Install system dependencies:
sudo apt updatesudo apt install -y python3 python3-pip python3-venv libxml-xpath-perl pdfgrep
  1. Create and activate virtual environment:
python3 -m venv venvsource venv/bin/activate
  1. Install Python dependencies:
cd serverpip install -r requirements.txt
  1. Run the server:
# Development modepython server.py# Production mode with Gunicorngunicorn --worker-class geventwebsocket.gunicorn.workers.GeventWebSocketWorker \         --workers 1 --bind 0.0.0.0:5000 server:app
Client Setup
  1. Navigate to the client directory:
cd exploit-seek/client
  1. Install client dependencies:
npm install
  1. Build the client application:
npm run build
  1. Serve the client application:
  • Using Python's HTTP server:
python3 -m http.server 8080 --directory dist
  • Or using Node.js serve package:
npx serve -s dist

📁 Project Structure

exploit-seek/├─ client/                    # Frontend application│  ├─ Dockerfile│  ├─ src/│  │  ├─ components/         # React components│  │  │  ├─ Auth/           # Authentication components│  │  │  ├─ ExploitsTable/  # Main analysis interface│  │  │  ├─ Footer/         # Footer components│  │  │  └─ Header/         # Header and settings│  │  ├─ hooks/             # Custom React hooks│  │  └─ App.jsx            # Main application component│  └─ vite.config.js        # Vite configuration├─ server/                   # Backend application│  ├─ Dockerfile│  ├─ auth.py               # Authentication handling│  ├─ constants.py          # Configuration constants│  ├─ cve_parsers.py       # CVE extraction logic│  ├─ data_loaders.py      # External API integrations│  ├─ excel_generator.py   # Excel report generation│  ├─ html_generator.py    # HTML report generation│  ├─ exploitdb_data.py   # ExploitDB integration│  ├─ logger_config.py     # Logging configuration│  ├─ models.py            # Database models│  ├─ routes.py            # API routes│  └─ server.py            # Server initialization├─ docs/                     # Screenshots and examples│  └─ images/│     ├─ dashboard.png│     └─ logo.png└─ docker-compose.yml        # Docker compose configuration

⚙️ Configuration

API Keys

The application requires API keys for full functionality:

Configure these in the application settings after installation.

Proxy Configuration

The application supports HTTP/HTTPS proxy configuration for all external API requests. You can configure proxy settings in three ways:

  1. No proxy (default)
  2. Basic proxy with host and port
  3. Authenticated proxy with username and password

To configure proxy in the web interface:

  1. Open Settings
  2. Enable proxy toggle
  3. Enter proxy details:
    • Host (required)
    • Port (required)
    • Username (optional)
    • Password (optional)

The proxy configuration will be applied to all external API requests, including:

  • NVD API
  • EPSS API
  • GitHub API
  • VulnCheck API
  • ExploitDB data
  • KEV catalog
  • Nuclei templates

📱 Usage

  1. Initial Setup
    • Configure server address
    • Set up API keys (NVD, VulnCheck)
    • Choose interface language (English/Russian)
    • Select theme mode (Dark/Light)
    • Configure other interface preferences
  2. Data Input
    • Choose input method (manual/file upload)
    • Select vulnerability scanner type
    • Upload or enter CVE data
  3. Analysis Configuration
    • Select data sources
    • Configure output settings
    • Choose sorting options
  4. Report Generation
    • Select report format (HTML/Excel)
    • Configure report details
    • Download and view results

🔍 Analysis Results

Reports include:

  • Detailed CVE information with CVSS scores
  • Exploitation probability assessments
  • Available public exploits from multiple sources
  • Patching priority recommendations
  • References and additional resources

Excel reports feature:

  • Color-coded priority indicators
  • Custom data filtering
  • Multiple data sheets
  • Summary statistics

HTML reports provide:

  • Interactive elements
  • Comprehensive data presentation
  • Easy navigation
  • Export capabilities

🌐 Resources Used

🛠️ Built With

Frontend

  • React + Vite
  • Material-UI
  • Socket.IO Client
  • Recharts

Backend

  • Flask
  • SQLAlchemy
  • Flask-SocketIO
  • OpenPyXL
  • Jinja2

Infrastructure

  • Docker
  • Docker Compose
  • Gunicorn
  • Gevent

🗺️ Roadmap

Upcoming features and improvements:

Intelligence Enhancement

  • 🧠 Neural analysis integration with Ollama
  • 🤖 AI-powered vulnerability assessment
  • 📈 Advanced risk prediction models

Scanner Integration

  • 🔍 Additional vulnerability scanner support
  • 🔄 Automated scan result import

Report Improvements

  • 📊 Enhanced interactive HTML reports
  • 🎨 Customizable report templates
  • 📈 Advanced data visualization options

Analysis Capabilities

  • 🔍 Deep learning-based exploit detection
  • 🎯 Enhanced risk scoring algorithms
  • 🔄 Real-time threat intelligence integration

📧 Contact

For questions, bug reports, and suggestions, please contact:shvs@cbi-info.ru


Releases

No releases published

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp