API Documentation
The EIP API gives you programmatic access to our full vulnerability and exploit database. Search CVEs, pull exploit metadata, download proof-of-concept code, and integrate real-time intelligence into your own tools and workflows. Free, public exploit intelligence — by design. Our rate limits are here to keep EIP stable, responsive, and fair for the whole community.
Base URL: https://exploit-intel.com/api/v1
All responses are JSON. No authentication required.
/api/v1/vulns
Search and list vulnerabilities with rich filtering.
q
string
Full-text search (CVE IDs, keywords, products)
severity
string
Filter by severity: critical, high, medium, low
has_exploits
bool
Only CVEs with public exploit code
is_kev
bool
Only CISA Known Exploited Vulnerabilities
any_exploited
bool
Only CVEs exploited in the wild (CISA KEV + VulnCheck KEV + InTheWild.io)
ransomware
bool
Only CVEs with confirmed ransomware campaign use
has_nuclei
bool
Only CVEs with Nuclei scanner templates
vendor
string
Filter by vendor name (partial match)
product
string
Filter by product name (partial match)
ecosystem
string
Filter by ecosystem (e.g. pypi, npm, maven)
cwe
string
Filter by CWE ID (e.g. CWE-79 or just 79)
year
int
Filter by CVE year (e.g. 2024)
min_cvss
float
Minimum CVSS v3 score (0-10)
min_epss
float
Minimum EPSS score (0-1)
date_from
string
Start date (YYYY-MM-DD)
date_to
string
End date (YYYY-MM-DD)
sort
string
Sort order: newest, oldest, cvss_desc, epss_desc, relevance
page
int
Page number (default: 1)
per_page
int
Results per page (default: 20, max: 100)
curl 'https://exploit-intel.com/api/v1/vulns?q=log4j&severity=critical&has_exploits=true'
/api/v1/vulns/{cve_id}
Get full vulnerability detail by CVE-ID or EIP-ID, including exploits, products, references, and Nuclei templates.
cve_id
path
CVE-2024-3400 or EIP-2024-12345
curl 'https://exploit-intel.com/api/v1/vulns/CVE-2021-44228'
/api/v1/exploits/{id}/files
List code files in an exploit archive. Used by the code viewer.
id
path
Exploit ID (integer)
curl 'https://exploit-intel.com/api/v1/exploits/77423/files'
/api/v1/exploits/{id}/code
Get source code content for a specific file in an exploit. Use /files to get valid file paths first.
id
path
Exploit ID (integer)
file
string
File path from the /files endpoint (includes archive prefix for tarballs)
curl 'https://exploit-intel.com/api/v1/exploits/77423/code?file=xwikisas--xwiki-pro-macros--049716df415a.patch'
/api/v1/exploits/{id}/download
Download exploit code as a password-protected ZIP (password: eip). Archive size varies by source and may be small.
id
path
Exploit ID (integer)
curl -o exploit.zip 'https://exploit-intel.com/api/v1/exploits/77423/download'
/api/v1/health
Health check endpoint. Returns service status.
curl 'https://exploit-intel.com/api/v1/health'
/api/v1/stats
Platform statistics: total CVEs, exploits, KEV count, etc.
curl 'https://exploit-intel.com/api/v1/stats'
/api/v1/stats/overview
Snapshot overview metrics from dashboard materialized view.
curl 'https://exploit-intel.com/api/v1/stats/overview'
/api/v1/stats/trends
Time-series datasets for CVE growth, exploitation discovery, exploit supply, and time-to-exploit.
curl 'https://exploit-intel.com/api/v1/stats/trends'
/api/v1/stats/leaderboards
Ranked vendor/CWE/source statistics for exploited vulnerabilities and exploit ecosystem coverage.
curl 'https://exploit-intel.com/api/v1/stats/leaderboards'
/api/v1/stats/freshness
Per-source ingestion freshness (latest completed run timestamps).
curl 'https://exploit-intel.com/api/v1/stats/freshness'
/api/v1/exploits
Search and browse exploits with rich filtering. Returns exploits with CVE context and AI analysis (attack type, complexity, reliability, MITRE techniques).
source
string
Filter by source: github, metasploit, exploitdb, nomisec, writeup
language
string
Filter by language: python, ruby, go, c, etc.
llm_classification
string
Filter by AI classification: working_poc, trojan, suspicious, scanner, stub, writeup
attack_type
string
Filter by attack type: RCE, SQLi, XSS, DoS, LPE, auth_bypass, info_leak, deserialization
complexity
string
Filter by complexity: trivial, simple, moderate, complex
reliability
string
Filter by reliability: reliable, unreliable, untested
requires_auth
bool
Filter by whether exploit requires authentication
author
string
Filter by author name
min_stars
int
Minimum GitHub stars
has_code
bool
Only exploits with downloadable code
cve
string
Filter by CVE ID (e.g. CVE-2024-3400)
vendor
string
Filter by vendor name (e.g. mitel, fortinet)
product
string
Filter by product name (e.g. micollab, pan-os)
sort
string
Sort order: newest, stars_desc
page
int
Page number (default: 1)
per_page
int
Results per page (default: 10, max: 25)
curl 'https://exploit-intel.com/api/v1/exploits?llm_classification=trojan'
/api/v1/authors
List exploit authors/researchers ranked by exploit count.
page
int
Page number (default: 1)
per_page
int
Results per page (default: 25, max: 50)
curl 'https://exploit-intel.com/api/v1/authors?per_page=10'
/api/v1/authors/{name}
Get an exploit author's profile with all their exploits, GitHub stars, and CVE context.
name
path
Author name (e.g. Chocapikk, muts)
page
int
Page number (default: 1)
per_page
int
Results per page (default: 25, max: 50)
curl 'https://exploit-intel.com/api/v1/authors/Chocapikk'
/api/v1/cwe
List CWE categories ranked by vulnerability count. Returns CWE IDs, names, short labels, and exploit likelihood.
curl 'https://exploit-intel.com/api/v1/cwe'
/api/v1/cwe/{cwe_id}
Get CWE detail including full name, description, exploit likelihood, parent CWE hierarchy, and vulnerability count.
cwe_id
path
CWE identifier (e.g. CWE-79 or just 79)
curl 'https://exploit-intel.com/api/v1/cwe/CWE-79'
/api/v1/vendors
List software vendors ranked by vulnerability count. Returns top 200 vendors.
curl 'https://exploit-intel.com/api/v1/vendors'
/api/v1/vendors/{vendor}/products
List products for a specific vendor with vulnerability counts. Useful for discovering exact CPE product names for filtering.
vendor
path
Vendor name (e.g. microsoft, apache, fortinet)
curl 'https://exploit-intel.com/api/v1/vendors/microsoft/products'
/api/v1/lookup
Resolve an alternate identifier (EDB-XXXXX, GHSA-XXXXX) to its CVE. Returns the matching CVE-ID with basic severity info.
alt_id
string
Alternate ID (e.g. EDB-48537, GHSA-jfh8-c2jp-5v3q)
curl 'https://exploit-intel.com/api/v1/lookup?alt_id=EDB-48537'