## https://sploitus.com/exploit?id=D1E049F1-393E-552D-80D1-675022B26911
## CVE-2024-6387_Check: A Vulnerability Check Tool
## Description
CVE-2024-6387_Check is a lightweight and efficient tool designed to identify servers running vulnerable versions of OpenSSH, specifically targeting the regreSSHion vulnerability (CVE-2024-6387). This script simplifies the quick analysis of multiple IP addresses, domain names, and CIDR network ranges to detect potential vulnerabilities and ensure your infrastructure remains secure.
## Features
- *Fast Analysis:* Quickly scans multiple IP addresses, domain names, and CIDR ranges for CVE-2024-6387 vulnerability.
- *Banner Retrieval:* Efficiently retrieves SSH banners without authentication.
- *Multi-threading:* Utilizes threads for simultaneous checks, significantly reducing scan time.
- *Detailed Output:* Provides a clear output summarizing the scan results.
- *Port Checking:* Identifies closed ports and provides a summary of unresponsive hosts.
## Usage
`python CVE-2024-6387_Check.py <targets> [--port PORT] [--timeout TIMEOUT] [--list FILE]`
### Examples
#### Single IP
`python CVE-2024-6387_Check.py 192.168.1.1`
#### IPs from a file
`python CVE-2024-6387_Check.py -l ip_list.txt`
#### Multiple IPs and domains
`python CVE-2024-6387_Check.py 192.168.1.1 example.com 192.168.1.2`
#### CIDR range
`python CVE-2024-6387_Check.py 192.168.1.0/24`
#### With custom port
`python CVE-2024-6387_Check.py 192.168.1.1 example.com --port 2222`