radar

CVE MAP

Introduction

CVE Map correlates National Vulnerability Database (NVD) intelligence with GitHub Repository scraping to provide a real-time index of public Proofs-of-Concept and Exploits.

lightbulb

Developer Notice

The API files are updated dynamically by our Go-based scraper hourly. They are static JSON files served via CDN for optimal performance, meaning you don't need authentication to GET the intelligence endpoints.

System Architecture & Pipeline

The core pipeline is written in Go. It operates via scheduled workers that poll GitHub's search API using rigorous rate-limiting bypassing techniques, matching CVE identifiers against commit messages, repo descriptions, and README files.

  • Automated matching mechanism
  • NVD CVSS score overlay
  • GitHub stars/forks sorting
  • Static JSON export

Pipeline Throughput (Nodes/Hour)

Data Endpoints

The intelligence feed is split by year. Access the static endpoints directly for integration into SIEMs or custom tooling.

Bash
# Fetch all exploits tracked in 2026
curl -s "https://yadavnikhil17102004.github.io/CVE_Map_hehe/data/2026.json" | jq .
# Fetch Live Cybersecurity News stream
curl -s "https://yadavnikhil17102004.github.io/CVE_Map_hehe/data/news.json" | jq .

JSON Schema

year integer
The index year mapping.
cves array[object]
Array of documented CVE entries and relative repositories.
cve_id string
"CVE-2023-1234"
repositories array[object]
GitHub Nodes
- full_name (string)
- stargazers_count (int)
- description (string)
- pushed_at (iso8601)

Global Sensor Network

CVE Map utilizes a globally distributed network of honeypots and passive traffic analyzers to correlate GitHub PoCs with active exploitation attempts in the wild.

Vulnerability Severity Distribution

Total Indexed Exploits ...
Signals / Min ~45k
False Positives < 0.01%
Network Status ONLINE
terminal

SYSTEM OVERRIDE

Designed by Nikhil