Loading HuntDB...

Hunt Documentation

Learn how to use Hunt to monitor and analyze security vulnerabilities affecting your infrastructure

Overview

Hunt helps you stay ahead of security threats by providing real-time monitoring of vulnerabilities that could affect your systems. Our platform combines data from multiple authoritative sources to give you a comprehensive view of the threat landscape:

  • Real-time CVE database updates from NVD and other sources
  • Automatic detection of proof-of-concept exploits
  • Integration with HackerOne vulnerability reports
  • Curated security news and vendor advisories
  • EPSS scores for vulnerability prioritization

Dashboard

Your Hunt dashboard provides an at-a-glance view of the current security landscape:

Real-time Statistics

  • • Total CVEs in database
  • • New vulnerabilities in last 24h
  • • Breakdown by severity level
  • • Trending vulnerability types

High-Impact Threats

  • • Critical/High severity CVEs
  • • Vulnerabilities with exploits
  • • High EPSS score threats
  • • Recently updated CVEs

CVE Monitoring

Stay informed about vulnerabilities that matter to your organization:

Detailed CVE Information

  • • Comprehensive vulnerability descriptions
  • • CVSS scores and severity ratings
  • • EPSS probability scores
  • • Affected products and versions
  • • Related security advisories
  • • Available proof-of-concept exploits

Email Notifications

Configure email alerts to stay updated on new security threats:

Notification Options

  • • Daily digest of new vulnerabilities
  • • Instant alerts for critical threats
  • • New exploit notifications
  • • Custom alert criteria

Security News

Stay informed with curated security news and updates:

News Features

  • • Latest security headlines
  • • Vendor security advisories
  • • Automatic linking to related CVEs
  • • Trending security topics

Security Insights

Get actionable insights about the threat landscape:

Trending Insights

  • • Vulnerability trends analysis
  • • Most targeted technologies
  • • Common attack vectors
  • • Emerging threat patterns

Impact Analysis

  • • High-impact vulnerabilities
  • • Exploit availability tracking
  • • EPSS score analysis
  • • Remediation guidance