SkillAgentSearch skills...

AdvancedWebVulnScanner

🛡️ The Advanced Vulnerability Scanner is a tool designed to identify common web vulnerabilities such as XSS, SQL Injection, CSRF, Open Redirect, File Inclusion, and Command Injection. It performs asynchronous scans and generates a report of vulnerabilities found.

Install / Use

/learn @cisamu123/AdvancedWebVulnScanner

README

🛡️ Advanced Vulnerability Scanner

<div id="badges"> <a href="https://t.me/CodQu"> <img src="https://img.shields.io/badge/Contact%20Me-blue?style=for-the-badge&logo=telegram&logoColor=white" alt="LinkedIn Badge"/> </a> <a href="https://t.me/Cisamu"> <img src="https://img.shields.io/badge/Join%20My%20Telegram%20Channel-blue?style=for-the-badge&logo=telegram&logoColor=white" alt="LinkedIn Badge"/> </a> </div>

🛡️ Description

The Advanced Vulnerability Scanner is a tool designed to identify common web vulnerabilities such as XSS, SQL Injection, CSRF, Open Redirect, File Inclusion, and Command Injection. It performs asynchronous scans and generates a report of vulnerabilities found.

Features

  • XSS Testing: Detects Cross-Site Scripting vulnerabilities.
  • SQL Injection Testing: Identifies SQL Injection vulnerabilities.
  • CSRF Testing: Checks for Cross-Site Request Forgery vulnerabilities.
  • Open Redirect Testing: Detects Open Redirect vulnerabilities.
  • File Inclusion Testing: Identifies File Inclusion vulnerabilities.
  • Command Injection Testing: Checks for Command Injection vulnerabilities.
  • Asynchronous Execution: Efficiently performs tests using asynchronous requests.
  • Detailed Report: Generates a detailed JSON report of vulnerabilities.

Installation

  1. Clone the repository:

    git clone https://github.com/cisamu123/AdvancedWebVulnScanner.git
    
  2. Navigate to the project directory:

    cd AdvancedWebVulnScanner
    
  3. Create and activate a virtual environment (optional but recommended):

    python -m venv venv
    source venv/bin/activate  # On Windows use `venv\Scripts\activate`
    
  4. Install the required dependencies:

    pip install -r requirements.txt
    

Usage

To run the scanner, use the following command:

python main.py <target_url> <report_file> [--user-agent <user_agent>] [--proxies <proxy_url>]

Example:
    
python main.py https://example.com report.json --user-agent "Mozilla/5.0" --proxies "http://localhost:8080"

💰 Donate:

BTC: bc1q5exw2v9sa0yktp2t7xnq8ma2xpn5a29s7w283y
ETH: 0x8d797249170d263B959A3c688D8456adBcfBC319
XMRT: 0xF978FE35d00A201eB48aB3908993e14f312001a2

View on GitHub
GitHub Stars5
CategoryData
Updated2mo ago
Forks3

Languages

Python

Security Score

90/100

Audited on Jan 26, 2026

No findings