Introduction
CVE Map correlates National Vulnerability Database (NVD) intelligence with GitHub Repository scraping to provide a real-time index of public Proofs-of-Concept and Exploits.
Developer Notice
The API files are updated dynamically by our Go-based scraper hourly. They are static JSON files served via CDN for optimal performance, meaning you don't need authentication to GET the intelligence endpoints.
System Architecture & Pipeline
The core pipeline is written in Go. It operates via scheduled workers that poll GitHub's search API using rigorous rate-limiting bypassing techniques, matching CVE identifiers against commit messages, repo descriptions, and README files.
- Automated matching mechanism
- NVD CVSS score overlay
- GitHub stars/forks sorting
- Static JSON export
Pipeline Throughput (Nodes/Hour)
Data Endpoints
The intelligence feed is split by year. Access the static endpoints directly for integration into SIEMs or custom tooling.
# Fetch all exploits tracked in 2026 curl -s "https://yadavnikhil17102004.github.io/CVE_Map_hehe/data/2026.json" | jq .
# Fetch Live Cybersecurity News stream curl -s "https://yadavnikhil17102004.github.io/CVE_Map_hehe/data/news.json" | jq .
JSON Schema
Global Sensor Network
CVE Map utilizes a globally distributed network of honeypots and passive traffic analyzers to correlate GitHub PoCs with active exploitation attempts in the wild.
Vulnerability Severity Distribution
SYSTEM OVERRIDE
Designed by Nikhil