Use this software only for legal purposes. (Example: Vulnerable training machines.)
I am in no way responsible for your actions.
Use python 3.7
Made by msd0pe
Cve-maker is a python tool to detect, find, compile and execute a CVE on the current or a remote machine.
It is intended to save you time.
You can easily find your CVEs on https://www.exploit-db.com/ or with the Search option.
Cve-maker will search on CVE databases for the payload associated with the CVE that you provide it with parameters.
It creates it in the directory "/tmp/exploit/" and compiles it if necessary. It then proposes you to execute it or not.
apt-get install gcc g++ git python2.7 python3
Download the project:
git clone https://github.com/msd0pe-1/cve-maker/
You only need to execute install.sh to get the libraries useful to the program : sh install.sh
Usage: python cve-maker.py [options] site
Options: --version show program's version number and exit -h, --help show this help message and exit -d, --detect detect vulnerabilities on the current machine -i, --check check if the edb-id is verified -r, --remote attack a target remotely -f FIND, --find=FIND looking for an exploit by its vulnerable software -c CVE, --cve=CVE looks for the CVE from its name -e EDB, --edb=EDB looks for the CVE from its EDB-ID -g GCC, --gcc=GCC add options to compilation -l LANG, --lang=LANG langage of the exploit [Default: c]
Available 0day sites: exploit_db
Langages: sh ruby perl python php c++ c
Examples: python cve-maker -e 12345 -l ruby exploit_db
python cve-maker -c 2019-98765 -g "-lpthread" exploit_db
Tool to find, compile and execute a CVE on the current machine. Source code put in public domain by msd0pe,no Copyright Any malicious or illegal activity may be punishable by law Use at your own risk
If you want to get the CVE thanks to its EDB-ID : 12345, coded in Ruby:
python cve-maker -e 12345 -l ruby exploit_db
If you have the CVE name, and it needs the gcc option "-lpthread" to be compiled correctly :
python cve-maker -c 2019-98765 -g "-lpthread" exploit_db
This project is in active development. Feel free to suggest a new feature or open a pull request !