Skip to content

Commit

Permalink
v1.0.0
Browse files Browse the repository at this point in the history
  • Loading branch information
thenurhabib authored Mar 30, 2022
1 parent 4f06e1b commit 9b308ec
Show file tree
Hide file tree
Showing 30 changed files with 1,309 additions and 0 deletions.
127 changes: 127 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,127 @@
<h1 align="center">
<br>
<a href="https://github.com/thenurhabib/vulscanpro"><img src="./img/logo.png" alt="vulscanpro"></a>
<br>
VulScanPro
<br>
</h1>

<h4 align="center">Automatic Web Vulnerability Scanner</h4>

<p align="center">
<a href="https://github.com/thenurhabib/vulscanpro/releases">
<img src="https://img.shields.io/github/release/thenurhabib/vulscanpro.svg">
</a>
<a href="https://travis-ci.com/thenurhabib/vulscanpro">
<img src="https://img.shields.io/travis/com/thenurhabib/vulscanpro.svg">
</a>
<a href="https://github.com/thenurhabib/vulscanpro/issues?q=is%3Aissue+is%3Aclosed">
<img src="https://img.shields.io/github/issues-closed-raw/thenurhabib/vulscanpro.svg">
</a>
</p>

![multi xss](./img/ss1.png)

<br>

```bash


__ __ _ _____ _____
\ \ / / | |/ ____| | __ \ 1.0.0
\ \ / / _| | (___ ___ __ _ _ __ | |__) | __ ___
\ \/ / | | | |\___ \ / __/ _` | '_ \| ___/ '__/ _ \
\ /| |_| | |____) | (_| (_| | | | | | | | | (_) |
\/ \__,_|_|_____/ \___\__,_|_| |_|_| |_| \___/
Automatic Web Vulnerability Scanner.
by @thenurhabib
```
<br>
VulScanPro is An Intelligent Automated Framework to scan a domain and perform various attacks to find vulnerabilities. VulScanPro performs 100+ attacks with mutiple web hacking and networking analyzing frameworks. and also it's provide you discription about that vulnerbitry and solution also.
### Find for This vulnerabilities
- Cross Site Scripting (XSS)
- SQL Injection
- Open Redirection
- Server-side request forgery (SSRF)
- Cross-site request forgery (CSRF)
- Cross-origin resource sharing (CORS)
- Host Heder Injection
- HTML Injection
- Session Hijacking
- Subdomain Takeover
- Sensitive Information disclosure
- shell injection
- clickjacking
- Remote Code execution
- path traversal
- Broken Access Control
- Security Misconfiguration
- Vulnerable and Outdated Components
- Unrestricted File Upload
`This Framework Also crawl URLs and JS Files for sensitive information.`
<br>
### Installation
```bash
git clone https://www.github.com/thenurhabib/vulscanpro
cd vulscanpro
pip install -r requirements.txt
python3 vulscanpro.py -h
```
<br>
#### Usage
```bash
>> python3 vulscanpro.py example.com (Scan Domain)
>> python3 vulscanpro.py example.com --skip (Skip some tools and scan faster.)
>> python3 vulscanpro.py example.com --nospinner (Disable the IDLE spinner.)
```
#### Available command line options
```bash
Usage :
>> python vulscanpro example.com
-h, --help : Help Menu
-s, --skip : Skip some tools and scan faster.
-u, --update : Update VulScanPro.
-n, --nospinner : Disable the IDLE spinner.
```
<hr>
#### Domain hijacking vulnerability in Yahoo
![pics](./img/ss2.png)
<br>
### :warning: Warning!
***I Am Not Responsible of any Illegal Use***
-------------------------------------
### _🕷️ Contribution & License_
You can contribute in following ways:
- [Report bugs & add issues](https://github.com/thenurhabib/vulscanpro/issues/new)
- Search for new vulnerability
- Develop plugins
- Searching Exploits
- Give suggestions **(Ideas)** to make it better
Do you want to have a conversation in private? email me : [email protected]
***VulScanPro*** is licensed under [GPL-3.0 License](https://github.com/thenurhabib/vulscanpro/blob/master/LICENSE)
Binary file added core/__pycache__/__init__.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/__init__.cpython-39.pyc
Binary file not shown.
Binary file added core/__pycache__/toolcmd.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/toolcmd.cpython-39.pyc
Binary file not shown.
Binary file added core/__pycache__/toolfix.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/toolfix.cpython-39.pyc
Binary file not shown.
Binary file added core/__pycache__/toolnames.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/toolnames.cpython-39.pyc
Binary file not shown.
Binary file added core/__pycache__/toolprecheck.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/toolprecheck.cpython-39.pyc
Binary file not shown.
Binary file added core/__pycache__/toolresp.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/toolresp.cpython-39.pyc
Binary file not shown.
Binary file added core/__pycache__/toolstatus.cpython-310.pyc
Binary file not shown.
Binary file added core/__pycache__/toolstatus.cpython-39.pyc
Binary file not shown.
104 changes: 104 additions & 0 deletions core/toolfix.py

Large diffs are not rendered by default.

4 changes: 4 additions & 0 deletions core/toolprecheck.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
toolsPreCheck = [
["wapiti"], ["whatweb"], ["nmap"], ["golismero"], ["host"], ["wget"], ["uniscan"], ["wafw00f"], ["dirb"], ["davtest"], ["theHarvester"], ["xsser"], [
"dnsrecon"], ["fierce"], ["dnswalk"], ["whois"], ["sslyze"], ["lbd"], ["golismero"], ["dnsenum"], ["dmitry"], ["davtest"], ["nikto"], ["dnsmap"], ["amass"]
]
249 changes: 249 additions & 0 deletions core/toolresp.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,249 @@
toolResponse = [

["Does not have an IPv6 Address. It is good to have one.","i",1],


["ASP.Net is misconfigured to throw server stack errors on screen.","m",2],


["WordPress Installation Found. Check for vulnerabilities corresponds to that version.","i",3],


["Drupal Installation Found. Check for vulnerabilities corresponds to that version.","i",4],


["Joomla Installation Found. Check for vulnerabilities corresponds to that version.","i",5],


["robots.txt/sitemap.xml found. Check those files for any information.","i",6],


["No Web Application Firewall Detected","m",7],


["Some ports are open. Perform a full-scan manually.","l",8],


["Email Addresses Found.","l",9],


["Zone Transfer Successful using DNSRecon. Reconfigure DNS immediately.","h",10],





["Zone Transfer Successful using dnswalk. Reconfigure DNS immediately.","h",10],


["Whois Information Publicly Available.","i",11],


["XSS Protection Filter is Disabled.","m",12],


["Vulnerable to Slowloris Denial of Service.","c",13],


["HEARTBLEED Vulnerability Found with SSLyze.","h",14],


["HEARTBLEED Vulnerability Found with Nmap.","h",14],


["POODLE Vulnerability Detected.","h",15],


["OpenSSL CCS Injection Detected.","h",16],


["FREAK Vulnerability Detected.","h",17],


["LOGJAM Vulnerability Detected.","h",18],


["Unsuccessful OCSP Response.","m",19],


["Server supports Deflate Compression.","m",20],


["Secure Client Initiated Renegotiation is supported.","m",21],


["Secure Resumption unsupported with (Sessions IDs/TLS Tickets).","m",22],


["No DNS/HTTP based Load Balancers Found.","l",23],


["Domain is spoofed/hijacked.","h",24],


["HEARTBLEED Vulnerability Found with Golismero.","h",14],


["Open Files Found with Golismero BruteForce.","m",25],


["Open Directories Found with Golismero BruteForce.","m",26],


["DB Banner retrieved with SQLMap.","l",27],


["Open Directories Found with DirB.","m",26],


["XSSer found XSS vulnerabilities.","c",28],


["Found SSL related vulnerabilities with Golismero.","m",29],


["Zone Transfer Successful with Golismero. Reconfigure DNS immediately.","h",10],


["Golismero Nikto Plugin found vulnerabilities.","m",30],


["Found Subdomains with Golismero.","m",31],


["Zone Transfer Successful using DNSEnum. Reconfigure DNS immediately.","h",10],


["Found Subdomains with Fierce.","m",31],


["Email Addresses discovered with DMitry.","l",9],


["Subdomains discovered with DMitry.","m",31],


["Telnet Service Detected.","h",32],


["FTP Service Detected.","c",33],


["Vulnerable to STUXNET.","c",34],


["WebDAV Enabled.","m",35],


["Found some information through Fingerprinting.","l",36],


["Open Files Found with Uniscan.","m",25],


["Open Directories Found with Uniscan.","m",26],


["Vulnerable to Stress Tests.","h",37],


["Uniscan detected possible LFI, RFI or RCE.","h",38],


["Uniscan detected possible XSS, SQLi, BSQLi.","h",39],


["Apache Expect XSS Header not present.","m",12],


["Found Subdomains with Nikto.","m",31],


["Webserver vulnerable to Shellshock Bug.","c",40],


["Webserver leaks Internal IP.","l",41],


["HTTP PUT DEL Methods Enabled.","m",42],


["Some vulnerable headers exposed.","m",43],


["Webserver vulnerable to MS10-070.","h",44],


["Some issues found on the Webserver.","m",30],


["Webserver is Outdated.","h",45],


["Some issues found with HTTP Options.","l",42],


["CGI Directories Enumerated.","l",26],


["Vulnerabilities reported in SSL Scans.","m",29],


["Interesting Files Detected.","m",25],


["Injectable Paths Detected.","l",46],


["Found Subdomains with DNSMap.","m",31],


["MS-SQL DB Service Detected.","l",47],


["MySQL DB Service Detected.","l",47],


["ORACLE DB Service Detected.","l",47],


["RDP Server Detected over UDP.","h",48],


["RDP Server Detected over TCP.","h",48],


["TCP Ports are Open","l",8],


["UDP Ports are Open","l",8],


["SNMP Service Detected.","m",49],


["Elmah is Configured.","m",50],


["SMB Ports are Open over TCP","m",51],


["SMB Ports are Open over UDP","m",51],


["Wapiti discovered a range of vulnerabilities","h",30],


["IIS WebDAV is Enabled","m",35],


["X-XSS Protection is not Present","m",12],


["Found Subdomains with AMass","m",31]



]


Loading

0 comments on commit 9b308ec

Please sign in to comment.