Skip to content

sanjib2006/web-vulnerability-scanner

Repository files navigation

Web Vulnerability Scanner

OPEN ONLY RUN.PY

Name: Sanjib Behera
Project Repository: https://github.com/sanjib2006/web-vulnerability-scanner.git

Installation

After installation open run.py...

Clone the Repository

To clone the project repository to your local machine, run the following command in your terminal:

git clone https://github.com/sanjib2006/web-vulnerability-scanner.git
cd web-vulnerability-scanner

Requirements

Python Library: Requests, Socket, Time, Threading

pip install -r requirements.txt

The Web Vulnerability Scanner is a Python-based security testing tool designed to identify and analyze potential vulnerabilities in web applications and networks. This project utilizes a variety of Python libraries, including socket, requests, threading, and time, along with specially curated wordlists for efficient and effective testing. It provides an easy-to-use interface, allowing users to select specific security tests to assess different aspects of a system's security posture.

The goal of this project is to automate common security testing procedures for web applications and networks, empowering security professionals and developers to identify vulnerabilities before malicious actors can exploit them.

Key Features

The Web Vulnerability Scanner includes the following key features:

  1. Network (Port) Scanner
    This tool scans open ports on a target domain or IP address, helping to identify potential vulnerabilities in the network infrastructure. It uses multi-threading to speed up the scanning process.

  2. Subdomain Enumeration
    Detects subdomains associated with a target domain. By using a wordlist of common subdomains, it checks each subdomain to see if it's live.

  3. Directory Listing (Brute Forcing)
    Attempts to discover hidden or inaccessible directories on the target domain using a wordlist. If a directory responds with a 200 OK status code, it is printed.

  4. SQL Injection Detection
    Tests for SQL injection vulnerabilities by injecting common SQL payloads into user input fields. If a server responds in a way that suggests an SQL vulnerability, it is flagged.

  5. XSS Detection
    Checks for Cross-Site Scripting (XSS) vulnerabilities by injecting various XSS payloads into user input fields. It can handle both GET and POST-based attacks.

  6. Brute Force Attack Simulation
    Tries a list of common passwords to test the strength of authentication systems. If the response does not indicate invalid credentials and a status code of 200 OK is returned, the correct password is assumed.


About

Web Vulnearbiity Scanner

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages