
π Vite/Vue JS Exploitation Toolkit This toolkit contains two Python scripts for identifying and exploiting Laravel applications with exposed .env files and vulnerable APP_KEYs. Screenshots Grabber Screenshots Exploit π§Ύ Script 1: main.py π Purpose: Finds exposed Vite dev servers on the internet using advanced Shodan queries, with support for country and custom filtering. Also provides domain/IP conversion utilities for pentesters and bug bounty researchers. π How It Works: β Uses a wide set of Vite fingerprinting queries to search Shodan. β Supports country code and custom Shodan filter input. β Saves hostnames and IPs in organized, timestamped folders. β Converts domain lists to IPs. β Performs reverse IP lookups (IP to domain). π₯ Usage: 1. Prepare your Shodan API key and edit the script to insert it. Run the script: python main.py Choose an option: Grab Hostname/Domain from Shodan (with filters) Domain to IP IP to Domain (Reverse IP) Follow the prompts for input files and filters. π Output: β Shodan results saved in: ResultGrabVite/[COUNTRY]/ResultHost_YYYYMMDD-HHMMSS.txt ResultGrabVite/[COUNTRY]/ResultIP_YYYYMMDD-HHMMSS.txt β Domain to IP results: ResultDomainToIPVite/DomainToIP_YYYYMMDD-HHMMSS.txt β IP to Domain results: ResultIPToDomainVite/IPToDomain_YYYYMMDD-HHMMSS.txt π¦ Dependencies: β shodan β colorama β requests Install with: pip install -r requirements.txt π§Ύ Script 2: vue.py π Purpose: Exploits Vite CVE-2025-31125 to read sensitive filesβ¦Read More
Exploit for CVE-2025-31125

