
๐ Vite/Vue JS Exploitation Toolkit This toolkit contains two Python scripts for identifying and exploiting Laravel applications with exposed .env files and vulnerable APP_KEYs. Screenshots Grabber Screenshots Exploit ๐งพ Script 1: main.py ๐ Purpose: Finds exposed Vite dev servers on the internet using advanced Shodan queries, with support for country and custom filtering. Also provides domain/IP conversion utilities for pentesters and bug bounty researchers. ๐ How It Works: – Uses a wide set of Vite fingerprinting queries to search Shodan. – Supports country code and custom Shodan filter input. – Saves hostnames and IPs in organized, timestamped folders. – Converts domain lists to IPs. – Performs reverse IP lookups (IP to domain). ๐ฅ Usage: 1. Prepare your Shodan API key and edit the script to insert it. Run the script: python main.py Choose an option: Grab Hostname/Domain from Shodan (with filters) Domain to IP IP to Domain (Reverse IP) Follow the prompts for input files and filters. ๐ Output: – Shodan results saved in: ResultGrabVite/[COUNTRY]/ResultHost_YYYYMMDD-HHMMSS.txt ResultGrabVite/[COUNTRY]/ResultIP_YYYYMMDD-HHMMSS.txt – Domain to IP results: ResultDomainToIPVite/DomainToIP_YYYYMMDD-HHMMSS.txt – IP to Domain results: ResultIPToDomainVite/IPToDomain_YYYYMMDD-HHMMSS.txt ๐ฆ Dependencies: – shodan – colorama – requests Install with: pip install -r requirements.txt ๐งพ Script 2: vue.py ๐ Purpose: Exploits Vite CVE-2025-31125 to read sensitive files…Read More
References
Back to Main