Automated Web Vulnerability Scanner β built for ethical hackers, students, and bug bounty hunters.
This tool is for educational purposes and authorized penetration testing only.
Never scan targets you donβt own or have explicit written permission to test.
The author is not responsible for misuse.
| Module | What it detects |
|---|---|
| 𧨠SQL Injection | Error-based & time-based SQLi in GET parameters |
| π₯ XSS | Reflected Cross-Site Scripting via GET parameters |
| π Open Redirect | Unvalidated redirects via URL parameters |
| π Sensitive Files | .env, .git/config, wp-config.php, admin panels, etc. |
| π‘οΈ Security Headers | CSP, HSTS, X-Frame-Options, X-Content-Type-Options, etc. |
| π±οΈ Clickjacking | Missing frame protection headers |
# 1. Clone the repo
git clone https://github.com/YOUR_USERNAME/web-vuln-scanner.git
cd web-vuln-scanner
# 2. (Recommended) Create a virtual environment
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
# 3. Install dependencies
pip install -r requirements.txt
python scanner.py -u https://example.com
python scanner.py -u https://example.com -p "id=1,search=hello"
python scanner.py -u https://example.com -p "id=1" --save report.json
-u / --url Target URL (required)
-p / --params GET params to fuzz: "key=val,key2=val2"
-t / --timeout Request timeout in seconds (default: 10)
-d / --delay Delay between requests (default: 0.5s)
--save Save findings to JSON file
__ __ _ __ _____ _ ___
\ \ / /__| | \ \ / / _ \ / / __|
...
[i] Target : https://testphp.vulnweb.com
[i] Timeout : 10s | Delay: 0.5s
βββββββββββββββββββββββββββββββββββββββ
4 β Sensitive Files & Directories
βββββββββββββββββββββββββββββββββββββββ
[β] VULN Β» Exposed: https://testphp.vulnweb.com/.git/config
βββββββββββββββββββββββββββββββββββββββ
5 β Security Headers
βββββββββββββββββββββββββββββββββββββββ
[β] VULN Β» Missing : Content-Security-Policy
[β] VULN Β» Missing : Strict-Transport-Security
[β] Present : X-Frame-Options
web-vuln-scanner/
βββ scanner.py # Main scanner script
βββ requirements.txt # Python dependencies
βββ README.md # This file
βββ report.json # (Generated) JSON report
Practice legally on this intentionally vulnerable site:
python scanner.py -u http://testphp.vulnweb.com -p "id=1,searchFor=test"
git checkout -b feature/my-featuregit commit -m "Add my feature"git push origin feature/my-featureMIT License β see LICENSE for details.
Youssef Mohamed
GitHub: @Yousif2005