Kali Linux

CVE-Tracker : With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs

CVE-Tracker, With the help of this automated script, you will never lose track of newly released CVEs. What does this powershell script do is exactly running the Microsoft Edge at system startup, navigate to 2 URLs ,and then put the browser in to full screen mode.

As ethical hackers, it’s vital that we keep track of the recently released CVEs in order to be fully aware of new threats or vulnerabilities out there in the Internet. Actually, it’s a routine task in our day to day lives. So why don’t we just automate the whole procedure of opening a browser and navigate to our sources for cheking the new CVEs? The purpose of this tool is to basically, automate the mentioned procedure with the help of powershell scripting.

Among all the online sources that are available which publish new CVEs, I’ve chosen the following 2 URLs and leveraged them in the script.

URLs
https://cvetrends.com/
https://cve.circl.lu/

 If you want to change these URLs to your desired ones, you can simply open the cve.ps1 file with an editor and change the URLs there! Also remember that you can even add more URLs to the file.

Usage

Download the zip file and unzip it on your system

If you haven’t bypassed the script execution on your system, please do so with the command “Set-ExecutionPolicy -ExecutionPolicy Bypass”
[Note: it needs to be run as administrator]

.\CVE_Track.ps1

Also, keep in mind the changes that are made to your system can easily be undone, by running the command .\undo.ps1

Technical Analysis

At first, when you run the script, it will create a *.bat file (CVE_Track.bat) in the following directory that literally allows the automation procedure that we aim for. C:\Users\<UserName>\\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ .

Also the file “cv.ps1” is coppied to the directory C:\Users\<UserName>\ and every time the system starts, it will be executed.

R K

Recent Posts

garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language Model Security

garak checks if an LLM can be made to fail in a way we don't…

15 hours ago

Vermilion : Mastering Linux Post-Exploitation For Red Team Success

Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…

15 hours ago

AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration

ADCFFS is a PowerShell script that can be used to exploit the AD CS container…

15 hours ago

Usage Of Tartufo – A Comprehensive Guide To Securing Your Git Repositories

Tartufo will, by default, scan the entire history of a git repository for any text…

15 hours ago

Loco : A Rails-Inspired Framework For Rust Developers

Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…

2 days ago

Monolith : The Ultimate Tool For Storing Entire Web Pages As Single HTML Files

A data hoarder’s dream come true: bundle any web page into a single HTML file.…

2 days ago