SCANter
Websites Vulnerability Scanner
Install / Use
/learn @Err0r-ICA/SCANterREADME
SCANter - Web Security Scanner 🔎
📒 Description 📒
-
Detect This vulnerabilities
- <h5>Remote Code Execution</h5> <ul><li>Linux</li></ul>
- <h5>XSS Reflected</h5>
- <h5>Template Injection</h5> <ul> <li> Jinja2 </li> <li> ERB </li> <li> Java </li> <li> Twig </li> <li> Freemarker </li> </ul>
- <h5>SQl Injection </h5>
📸 Screenshot 📸

OS Support
- <h5> Kali Linux </h5>
- <h5> Android - Termux </h5>
- <h5> Windows </h5>
💿 Installation 💿
Linux 
- open your terminal
- enter this command
$ git clone https://github.com/Err0r-ICA/SCANter $ cd SCANter $ python3 -m pip install -r requirements.txt
Android <img src="https://img.icons8.com/clouds/100/000000/android-os.png">
- Download <a href='https://play.google.com/store/apps/details?id=com.termux&hl=en'>Termux App</a>
- open termux app
- enter this command
$ pkg install python -y
$ pkg install git -y
$ git clone https://github.com/Err0r-ICA/SCANter
$ cd SCANter
$ python3 -m pip install -r requirements.txt
Windows <img src="https://img.icons8.com/color/48/000000/windows-10.png">
- Download <a href='https://www.python.org/downloads/windows/'>python3</a> and install it
- open your cmd
- enter this command
$ python3 -m pip install -r requirements.txt
🧾 Usage 🧾
Options:
-h, --help | Show help message and exit
--version | Show program's version number and exit
-u URL, --url=URL | Target URL (e.g."http://www.target.com/vuln.php?id=1")
--data=DATA | Data string to be sent through POST (e.g. "id=1")
--list=FILE | Get All Urls from List
--threads | Max number of concurrent HTTP(s) requests (default 10)
--timeout | Seconds to wait before timeout connection
--proxy | Start The Connection with http(s) proxy
--cookies | HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
--encode | How Many encode the payload (default 1)
--allow-redirect | Allow the main redirect
--verify | Skip HTTPS Cert Error
--user-agent | add custom user-agent
--scan-headers | Try to inject payloads in headers not parameters (user-agent,referrer)
--skip-headers | Skip The Headers scanning processe
--sleep | Sent one request after some Seconds
--batch | Never ask for user input, use the default behavior
--module | add custom module (e.g. "google.py")
☠️ Input Example ☠️
$ python3 ICAscanner -u 'http://localhost/dvwa/vulnerabilities/exec/' --data='ip=localhost&Submit=Submit' --cookies='PHPSESSID=safasf'
My Accounts
<a href="https://instagram.com/defacer1337"><img align="left" alt="codeSTACKr | Instagram" width="22px" src="https://cdn.jsdelivr.net/npm/simple-icons@v3/icons/instagram.svg" /></a> <a href="https://www.tiktok.com/@err0r_hb?_t=8qVhutK5QKf&_r=1"><img align="left" alt="codeSTACKr | TikTok" width="22px" src="https://cdn.jsdelivr.net/npm/simple-icons@v3/icons/tiktok.svg" /></a> <a href="https://t.me/defacer1337"><img align="left" alt="codeSTACKr | Telegram" width="22px" src="https://cdn.jsdelivr.net/npm/simple-icons@v3/icons/telegram.svg" /></a><br>
