Metadata-Version: 2.1
Name: sve
Version: 0.3.2
Summary: Service vulnerability enumeration tool
Home-page: https://github.com/bl0nd/sve
Author: Jason Phan
Author-email: xorblonded@gmail.com
License: MIT
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: End Users/Desktop
Classifier: Natural Language :: English
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3.7
Requires-Python: >=3.7
Description-Content-Type: text/markdown

# sve

[![PyPI version shields.io](https://img.shields.io/pypi/v/sve.svg)](https://pypi.python.org/pypi/sve/)
[![image](https://img.shields.io/badge/license-MIT-green.svg)](https://github.com/bl0nd/sve)
<!--[![image](https://img.shields.io/badge/contributors.svg)](https://pypi.org/project/sve/)-->
<!--[![image](https://img.shields.io/badge/vulnerabilities.svg)](https://pypi.org/project/sve/)-->

Sve is a community-driven enumeration tool for vulnerable service configurations.

<p align="center"> <img src="https://user-images.githubusercontent.com/25558240/51778758-1f783e00-20c9-11e9-9b30-277c56e97175.png"></p>


## Services
Currently, covered services include:
* `VSFTP`
* `SSH`


## Contributing
Found a vulnerable configuration that isn't covered? Contributions are very welcome! Take a look at the [contributing guidelines](https://github.com/bl0nd/sve/blob/master/CONTRIBUTING.md) to get started!



