About WedusGhembel

What is WedusGhembel?

WedusGhembel is a comprehensive web application that combines vulnerability data from CISA's Known Exploited Vulnerabilities (KEV) Catalog with exploit code from Exploit-DB. It provides a powerful search interface and intelligent recommendations to help security researchers, penetration testers, and IT professionals find relevant information about vulnerabilities and their corresponding exploits.

Features

  • Combined Database - Access both CISA KEV data and Exploit-DB in one place
  • Intelligent Mapping - CVEs are automatically mapped to relevant exploits
  • Powerful Search - Find vulnerabilities and exploits by CVE ID, vendor, product, or keyword
  • Exploit Recommendations - Get relevant exploit suggestions when looking up CVEs
  • Confidence Scoring - Each CVE-to-exploit mapping includes a confidence score
  • Regular Updates - Data is regularly updated from both sources

Data Sources

CISA KEV Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) maintains a catalog of Known Exploited Vulnerabilities that are being actively exploited in the wild. This catalog is an authoritative source for high-risk vulnerabilities that require attention.

Visit CISA KEV Catalog
Exploit-DB

Exploit-DB is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. It is maintained by Offensive Security.

Visit Exploit-DB

How It Works

WedusGhembel works by periodically downloading and processing data from both CISA KEV and Exploit-DB. It uses several methods to match CVEs with corresponding exploits:

  1. Direct References - When an exploit explicitly mentions a CVE ID in its description
  2. Text Matching - Using vulnerability names and descriptions to find potential matches
  3. Product References - Matching exploits to CVEs based on affected products

Each mapping is assigned a confidence score to help users understand how likely the exploit is to be relevant to the CVE.

Usage Recommendations

Important Note

WedusGhembel is designed for security professionals, researchers, and IT administrators to understand vulnerabilities and available exploits. Always ensure you have proper authorization before testing any exploits against systems. Unauthorized use of exploits against systems you do not own or have permission to test is illegal and unethical.

Technical Details

WedusGhembel is built using the following technologies:

  • Backend: PHP, MySQL
  • Frontend: HTML5, CSS3, JavaScript
  • Libraries: jQuery, Bootstrap, Chart.js
  • APIs: Custom RESTful API for search and data retrieval
  • Hosting: Compatible with cPanel hosting environments

Contact Information

If you have any questions, suggestions, or issues with WedusGhembel, please feel free to contact us: