AdvancedWebVulnScanner
🛡️ The Advanced Vulnerability Scanner is a tool designed to identify common web vulnerabilities such as XSS, SQL Injection, CSRF, Open Redirect, File Inclusion, and Command Injection. It performs asynchronous scans and generates a report of vulnerabilities found.
Install / Use
/learn @cisamu123/AdvancedWebVulnScannerREADME
🛡️ Advanced Vulnerability Scanner
<div id="badges"> <a href="https://t.me/CodQu"> <img src="https://img.shields.io/badge/Contact%20Me-blue?style=for-the-badge&logo=telegram&logoColor=white" alt="LinkedIn Badge"/> </a> <a href="https://t.me/Cisamu"> <img src="https://img.shields.io/badge/Join%20My%20Telegram%20Channel-blue?style=for-the-badge&logo=telegram&logoColor=white" alt="LinkedIn Badge"/> </a> </div>🛡️ Description
The Advanced Vulnerability Scanner is a tool designed to identify common web vulnerabilities such as XSS, SQL Injection, CSRF, Open Redirect, File Inclusion, and Command Injection. It performs asynchronous scans and generates a report of vulnerabilities found.
Features
- XSS Testing: Detects Cross-Site Scripting vulnerabilities.
- SQL Injection Testing: Identifies SQL Injection vulnerabilities.
- CSRF Testing: Checks for Cross-Site Request Forgery vulnerabilities.
- Open Redirect Testing: Detects Open Redirect vulnerabilities.
- File Inclusion Testing: Identifies File Inclusion vulnerabilities.
- Command Injection Testing: Checks for Command Injection vulnerabilities.
- Asynchronous Execution: Efficiently performs tests using asynchronous requests.
- Detailed Report: Generates a detailed JSON report of vulnerabilities.
Installation
-
Clone the repository:
git clone https://github.com/cisamu123/AdvancedWebVulnScanner.git -
Navigate to the project directory:
cd AdvancedWebVulnScanner -
Create and activate a virtual environment (optional but recommended):
python -m venv venv source venv/bin/activate # On Windows use `venv\Scripts\activate` -
Install the required dependencies:
pip install -r requirements.txt
Usage
To run the scanner, use the following command:
python main.py <target_url> <report_file> [--user-agent <user_agent>] [--proxies <proxy_url>]
Example:
python main.py https://example.com report.json --user-agent "Mozilla/5.0" --proxies "http://localhost:8080"
💰 Donate:
BTC: bc1q5exw2v9sa0yktp2t7xnq8ma2xpn5a29s7w283y
ETH: 0x8d797249170d263B959A3c688D8456adBcfBC319
XMRT: 0xF978FE35d00A201eB48aB3908993e14f312001a2
