01 / 10
Introduction
EIP

The Exploit Intelligence
Platform

Aggregating, correlating, and enriching vulnerability and exploit data from 14+ sources into a unified intelligence layer for security professionals and AI agents.

exploit-intel.com
The Basics

What is EIP?

Software has bugs. Some bugs are security vulnerabilities. Some vulnerabilities have public exploit code. EIP tracks all of it -- every known vulnerability, every public exploit, every signal that tells you what matters.

Vulnerabilities

CVEs -- unique identifiers for security flaws in software. EIP ingests them from NVD, CVE.org, and 12 other sources to build the most complete picture available.

Exploits

Proof-of-concept code that demonstrates how to trigger a vulnerability. EIP collects exploits from Metasploit, ExploitDB, GitHub, and more -- then ranks them by reliability.

Intelligence

Raw data is not enough. EIP correlates exploits to CVEs, flags active exploitation, scores risk with EPSS, and uses AI to classify every exploit for attack type and reliability.

Scale

The Numbers

A real-time snapshot of everything the platform tracks -- updated four times daily via a fully automated pipeline.

370K+
CVEs Tracked
105K+
Total Exploits
53K+
CVEs with Exploits
1,551
CISA KEV
3,948
Nuclei Templates
49K+
Vendors
42K+
Researchers
14
Data Sources
Overview

How It Works

A continuous data pipeline ingests from 14 sources, normalizes into PostgreSQL, enriches with AI, and serves through a web UI, REST API, MCP server, and CLI tool.

Ingest

14 data sources crawled 4x daily via 22-step pipeline

Normalize

Match exploits to CVEs, deduplicate, rank by quality

Enrich

AI title generation, exploit analysis, trojan detection

Store

PostgreSQL 16 with materialized views and full-text search

Serve

Web UI, REST API, MCP server, CLI tool, RSS feeds

14 sources · 22 pipeline steps · 4x daily · fully automated
Coverage

14+ Data Sources

Every major vulnerability and exploit source, crawled and correlated into a single unified database.

NVD
CVE data
CISA KEV
Active exploitation
EPSS
Exploit probability
ExploitDB
Curated exploits
GitHub PoCs
53K+ repos
NomiSec
PoC index
Metasploit
Framework modules
Nuclei
Detection templates
InTheWild
Wild exploitation
VulnCheck KEV
Extended KEV
GHSA
GitHub advisories
CVE.org
CVE List v5
EUVD
EU signals
OSV
Open source vulns
PatchaPalooza
Curated PoCs
GitLab PoCs
Beyond GitHub
17 Crawlers 105K+ Exploits 370K+ CVEs
AI Layer

Intelligence & Enrichment

Every vulnerability gets AI-generated titles. Every exploit gets classified for attack type, complexity, and reliability. Trojans are detected and flagged with deception indicators.

Exploit Ranking

  • Metasploit modules (peer-reviewed, weaponized)
  • Verified ExploitDB entries (curated)
  • GitHub PoCs ranked by stars and language
  • Trojans flagged at bottom with warnings

AI Classification

  • Attack type: RCE, SQLi, XSS, DoS, LPE
  • Complexity: trivial to complex
  • Reliability: tested vs theoretical
  • MITRE ATT&CK technique mapping

Trojan Detection

  • Deception indicators and IOCs
  • Backdoor mechanics analysis
  • Operator risk assessment
  • Evidence snippets from source code
99.99%
AI Title Coverage
61K+
Exploits Analyzed
4
Exploitation Signals
6
Analysis Dimensions
Interfaces

Access Everywhere

A web UI for humans, a REST API for automation, an MCP server for AI assistants, and a CLI tool for your terminal.

Web UI

Full-text search with 18 filters, exploit code viewer, statistics dashboard, 7 color themes, Docker labs browser

Jinja2 7 Themes

REST API

FastAPI backend with 21 endpoints, vulnerability search, exploit detail and code, author profiles, CWE rankings, vendor data

FastAPI 60/min

MCP Server

17 tools and 6 prompt workflows for AI assistants. Search vulns, analyze exploits, audit stacks, generate pentest findings

17 Tools 6 Prompts

CLI Tool

Terminal-based vulnerability lookup with 30+ commands, offline SQLite mode, formatted Rich output for security researchers

eip-search Offline
Live Demo

MCP Server in Action

Real terminal recordings showing the MCP server connected to Claude Code -- from setup to vulnerability research.

Remote MCP setup + tool flow
Impact

What EIP Delivers

Comprehensive vulnerability intelligence that no single source provides alone.

Coverage

  • 370K+ CVEs with 99.99% AI-generated titles
  • 105K+ exploits from 8 sources, ranked by quality
  • 53K+ CVEs matched to at least one public exploit
  • 3,948 Nuclei detection templates with recon dorks
  • 2,300+ Docker labs for hands-on exploitation

Intelligence

  • 4 independent exploitation signals per CVE
  • Ransomware campaign attribution via VulnCheck
  • 61K+ exploits analyzed for type, complexity, reliability
  • Trojan detection with deception indicators
  • MITRE ATT&CK mapping for every analyzed exploit
Updated 4x daily · 22-step pipeline · 14 sources · 17 MCP tools
From raw CVE data to actionable intelligence, fully automated.
EIP

Start Searching

Comprehensive vulnerability and exploit intelligence -- aggregated from 14 sources, enriched by AI, accessible to humans and machines.

370K+
CVEs
105K+
Exploits
14
Sources
17
MCP Tools