| Crates.io | cve_explorer_pro |
| lib.rs | cve_explorer_pro |
| version | 0.1.1 |
| created_at | 2025-09-15 21:01:35.316961+00 |
| updated_at | 2025-09-18 14:14:06.561521+00 |
| description | A comprehensive CVE vulnerability analysis library with deep exploitation path exploration and root cause analysis |
| homepage | https://github.com/kayo09/ForMistakeLearning |
| repository | https://github.com/kayo09/ForMistakeLearning |
| max_upload_size | |
| id | 1840554 |
| size | 176,621 |
🔍 A comprehensive Rust library for deep CVE vulnerability analysis and exploitation path exploration
Add this to your Cargo.toml:
[dependencies]
cve_explorer_pro = "0.1.0"
Or install the CLI tool:
cargo install cve_explorer_pro
use cve_explorer_pro::{CVEFetcher, RootCauseAnalyzer, ExploitationPathAnalyzer};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
// Initialize the fetcher
let fetcher = CVEFetcher::new(Some("your_nvd_api_key".to_string()));
// Fetch CVE data
let cve = fetcher.fetch_cve("CVE-2021-34527").await?;
// Perform root cause analysis
let analyzer = RootCauseAnalyzer;
let analysis = analyzer.analyze_vulnerability(&cve);
// Analyze exploitation paths
let exploit_analyzer = ExploitationPathAnalyzer;
let exploitation = exploit_analyzer.analyze_exploitation_path(&cve);
println!("Primary Cause: {:?}", analysis.primary_cause);
println!("Exploitation Complexity: {:.1}", exploitation.exploitation_complexity.overall_score);
Ok(())
}
# Basic analysis
cve_explorer_pro -c CVE-2021-34527 -m basic
# Full exploitation analysis
cve_explorer_pro -c CVE-2021-34527 -m exploitation -f detailed
# Complete analysis with JSON output
cve_explorer_pro -c CVE-2021-34527 -m full -f json --api-key YOUR_API_KEY
Retrieves vulnerability data from the National Vulnerability Database (NVD).
Identifies primary causes, contributing factors, and architectural flaws:
Maps attack surfaces and exploitation complexity:
Human-readable analysis with emojis and structured sections.
Machine-readable format for integration with other tools:
{
"cve": {
"id": "CVE-2021-34527",
"description": "...",
"cvss": {
"base_score": 8.8,
"severity": "High"
}
},
"root_cause_analysis": {
"primary_cause": "PrivilegeEscalation",
"contributing_factors": ["PoorSecurityDesign"]
},
"exploitation_analysis": {
"exploitation_complexity": {
"overall_score": 2.5,
"difficulty_level": "Intermediate"
}
}
}
Concise overview with key findings and recommendations.
This tool is designed for:
⚠️ Important: Use only in authorized environments. Always follow responsible disclosure practices.
Get your free NVD API key from NIST:
export NVD_API_KEY="your-api-key-here"
cve_explorer_pro -c CVE-2021-34527 --api-key $NVD_API_KEY
Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.
git checkout -b feature/AmazingFeature)git commit -m 'Add some AmazingFeature')git push origin feature/AmazingFeature)This project is licensed under the MIT License - see the LICENSE file for details.
Krutarth Parmar
⭐ If you find this project helpful, please consider giving it a star!