Execute network exploitation and post-exploitation operations using tools like nc, socat, scapy, or chisel to assess target systems and identify vulnerabilities.
Retrieve active exploitation data for a specific vulnerability to assess risk, prioritize remediation, and inform incident response. Input a CVE ID or UUID to access timestamps, detection methods, and exploitation frequency.
Retrieve detailed exploitation data using a unique identifier to determine if a vulnerability has been exploited in the wild, including detection source, timeframe, and method.
Retrieve detailed exploitation data for a specific vulnerability incident using its unique identifier to determine if it has been exploited in the wild and identify the detection source.
Enables AI assistants to access the Consumer Rights Wiki, providing tools to search and retrieve information about modern consumer exploitation issues like privacy violations, dark patterns, and deceptive pricing practices.
A server that retrieves CVE details from the NVD API and fetches EPSS scores to provide comprehensive vulnerability information, including descriptions, CWEs, CVSS scores, and exploitation likelihood percentiles.