-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
4f06e1b
commit 9b308ec
Showing
30 changed files
with
1,309 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,127 @@ | ||
<h1 align="center"> | ||
<br> | ||
<a href="https://github.com/thenurhabib/vulscanpro"><img src="./img/logo.png" alt="vulscanpro"></a> | ||
<br> | ||
VulScanPro | ||
<br> | ||
</h1> | ||
|
||
<h4 align="center">Automatic Web Vulnerability Scanner</h4> | ||
|
||
<p align="center"> | ||
<a href="https://github.com/thenurhabib/vulscanpro/releases"> | ||
<img src="https://img.shields.io/github/release/thenurhabib/vulscanpro.svg"> | ||
</a> | ||
<a href="https://travis-ci.com/thenurhabib/vulscanpro"> | ||
<img src="https://img.shields.io/travis/com/thenurhabib/vulscanpro.svg"> | ||
</a> | ||
<a href="https://github.com/thenurhabib/vulscanpro/issues?q=is%3Aissue+is%3Aclosed"> | ||
<img src="https://img.shields.io/github/issues-closed-raw/thenurhabib/vulscanpro.svg"> | ||
</a> | ||
</p> | ||
|
||
![multi xss](./img/ss1.png) | ||
|
||
<br> | ||
|
||
```bash | ||
|
||
|
||
__ __ _ _____ _____ | ||
\ \ / / | |/ ____| | __ \ 1.0.0 | ||
\ \ / / _| | (___ ___ __ _ _ __ | |__) | __ ___ | ||
\ \/ / | | | |\___ \ / __/ _` | '_ \| ___/ '__/ _ \ | ||
\ /| |_| | |____) | (_| (_| | | | | | | | | (_) | | ||
\/ \__,_|_|_____/ \___\__,_|_| |_|_| |_| \___/ | ||
Automatic Web Vulnerability Scanner. | ||
by @thenurhabib | ||
``` | ||
<br> | ||
VulScanPro is An Intelligent Automated Framework to scan a domain and perform various attacks to find vulnerabilities. VulScanPro performs 100+ attacks with mutiple web hacking and networking analyzing frameworks. and also it's provide you discription about that vulnerbitry and solution also. | ||
### Find for This vulnerabilities | ||
- Cross Site Scripting (XSS) | ||
- SQL Injection | ||
- Open Redirection | ||
- Server-side request forgery (SSRF) | ||
- Cross-site request forgery (CSRF) | ||
- Cross-origin resource sharing (CORS) | ||
- Host Heder Injection | ||
- HTML Injection | ||
- Session Hijacking | ||
- Subdomain Takeover | ||
- Sensitive Information disclosure | ||
- shell injection | ||
- clickjacking | ||
- Remote Code execution | ||
- path traversal | ||
- Broken Access Control | ||
- Security Misconfiguration | ||
- Vulnerable and Outdated Components | ||
- Unrestricted File Upload | ||
`This Framework Also crawl URLs and JS Files for sensitive information.` | ||
<br> | ||
### Installation | ||
```bash | ||
git clone https://www.github.com/thenurhabib/vulscanpro | ||
cd vulscanpro | ||
pip install -r requirements.txt | ||
python3 vulscanpro.py -h | ||
``` | ||
<br> | ||
#### Usage | ||
```bash | ||
>> python3 vulscanpro.py example.com (Scan Domain) | ||
>> python3 vulscanpro.py example.com --skip (Skip some tools and scan faster.) | ||
>> python3 vulscanpro.py example.com --nospinner (Disable the IDLE spinner.) | ||
``` | ||
#### Available command line options | ||
```bash | ||
Usage : | ||
>> python vulscanpro example.com | ||
-h, --help : Help Menu | ||
-s, --skip : Skip some tools and scan faster. | ||
-u, --update : Update VulScanPro. | ||
-n, --nospinner : Disable the IDLE spinner. | ||
``` | ||
<hr> | ||
#### Domain hijacking vulnerability in Yahoo | ||
![pics](./img/ss2.png) | ||
<br> | ||
### :warning: Warning! | ||
***I Am Not Responsible of any Illegal Use*** | ||
------------------------------------- | ||
### _🕷️ Contribution & License_ | ||
You can contribute in following ways: | ||
- [Report bugs & add issues](https://github.com/thenurhabib/vulscanpro/issues/new) | ||
- Search for new vulnerability | ||
- Develop plugins | ||
- Searching Exploits | ||
- Give suggestions **(Ideas)** to make it better | ||
Do you want to have a conversation in private? email me : [email protected] | ||
***VulScanPro*** is licensed under [GPL-3.0 License](https://github.com/thenurhabib/vulscanpro/blob/master/LICENSE) |
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
toolsPreCheck = [ | ||
["wapiti"], ["whatweb"], ["nmap"], ["golismero"], ["host"], ["wget"], ["uniscan"], ["wafw00f"], ["dirb"], ["davtest"], ["theHarvester"], ["xsser"], [ | ||
"dnsrecon"], ["fierce"], ["dnswalk"], ["whois"], ["sslyze"], ["lbd"], ["golismero"], ["dnsenum"], ["dmitry"], ["davtest"], ["nikto"], ["dnsmap"], ["amass"] | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,249 @@ | ||
toolResponse = [ | ||
|
||
["Does not have an IPv6 Address. It is good to have one.","i",1], | ||
|
||
|
||
["ASP.Net is misconfigured to throw server stack errors on screen.","m",2], | ||
|
||
|
||
["WordPress Installation Found. Check for vulnerabilities corresponds to that version.","i",3], | ||
|
||
|
||
["Drupal Installation Found. Check for vulnerabilities corresponds to that version.","i",4], | ||
|
||
|
||
["Joomla Installation Found. Check for vulnerabilities corresponds to that version.","i",5], | ||
|
||
|
||
["robots.txt/sitemap.xml found. Check those files for any information.","i",6], | ||
|
||
|
||
["No Web Application Firewall Detected","m",7], | ||
|
||
|
||
["Some ports are open. Perform a full-scan manually.","l",8], | ||
|
||
|
||
["Email Addresses Found.","l",9], | ||
|
||
|
||
["Zone Transfer Successful using DNSRecon. Reconfigure DNS immediately.","h",10], | ||
|
||
|
||
|
||
|
||
|
||
["Zone Transfer Successful using dnswalk. Reconfigure DNS immediately.","h",10], | ||
|
||
|
||
["Whois Information Publicly Available.","i",11], | ||
|
||
|
||
["XSS Protection Filter is Disabled.","m",12], | ||
|
||
|
||
["Vulnerable to Slowloris Denial of Service.","c",13], | ||
|
||
|
||
["HEARTBLEED Vulnerability Found with SSLyze.","h",14], | ||
|
||
|
||
["HEARTBLEED Vulnerability Found with Nmap.","h",14], | ||
|
||
|
||
["POODLE Vulnerability Detected.","h",15], | ||
|
||
|
||
["OpenSSL CCS Injection Detected.","h",16], | ||
|
||
|
||
["FREAK Vulnerability Detected.","h",17], | ||
|
||
|
||
["LOGJAM Vulnerability Detected.","h",18], | ||
|
||
|
||
["Unsuccessful OCSP Response.","m",19], | ||
|
||
|
||
["Server supports Deflate Compression.","m",20], | ||
|
||
|
||
["Secure Client Initiated Renegotiation is supported.","m",21], | ||
|
||
|
||
["Secure Resumption unsupported with (Sessions IDs/TLS Tickets).","m",22], | ||
|
||
|
||
["No DNS/HTTP based Load Balancers Found.","l",23], | ||
|
||
|
||
["Domain is spoofed/hijacked.","h",24], | ||
|
||
|
||
["HEARTBLEED Vulnerability Found with Golismero.","h",14], | ||
|
||
|
||
["Open Files Found with Golismero BruteForce.","m",25], | ||
|
||
|
||
["Open Directories Found with Golismero BruteForce.","m",26], | ||
|
||
|
||
["DB Banner retrieved with SQLMap.","l",27], | ||
|
||
|
||
["Open Directories Found with DirB.","m",26], | ||
|
||
|
||
["XSSer found XSS vulnerabilities.","c",28], | ||
|
||
|
||
["Found SSL related vulnerabilities with Golismero.","m",29], | ||
|
||
|
||
["Zone Transfer Successful with Golismero. Reconfigure DNS immediately.","h",10], | ||
|
||
|
||
["Golismero Nikto Plugin found vulnerabilities.","m",30], | ||
|
||
|
||
["Found Subdomains with Golismero.","m",31], | ||
|
||
|
||
["Zone Transfer Successful using DNSEnum. Reconfigure DNS immediately.","h",10], | ||
|
||
|
||
["Found Subdomains with Fierce.","m",31], | ||
|
||
|
||
["Email Addresses discovered with DMitry.","l",9], | ||
|
||
|
||
["Subdomains discovered with DMitry.","m",31], | ||
|
||
|
||
["Telnet Service Detected.","h",32], | ||
|
||
|
||
["FTP Service Detected.","c",33], | ||
|
||
|
||
["Vulnerable to STUXNET.","c",34], | ||
|
||
|
||
["WebDAV Enabled.","m",35], | ||
|
||
|
||
["Found some information through Fingerprinting.","l",36], | ||
|
||
|
||
["Open Files Found with Uniscan.","m",25], | ||
|
||
|
||
["Open Directories Found with Uniscan.","m",26], | ||
|
||
|
||
["Vulnerable to Stress Tests.","h",37], | ||
|
||
|
||
["Uniscan detected possible LFI, RFI or RCE.","h",38], | ||
|
||
|
||
["Uniscan detected possible XSS, SQLi, BSQLi.","h",39], | ||
|
||
|
||
["Apache Expect XSS Header not present.","m",12], | ||
|
||
|
||
["Found Subdomains with Nikto.","m",31], | ||
|
||
|
||
["Webserver vulnerable to Shellshock Bug.","c",40], | ||
|
||
|
||
["Webserver leaks Internal IP.","l",41], | ||
|
||
|
||
["HTTP PUT DEL Methods Enabled.","m",42], | ||
|
||
|
||
["Some vulnerable headers exposed.","m",43], | ||
|
||
|
||
["Webserver vulnerable to MS10-070.","h",44], | ||
|
||
|
||
["Some issues found on the Webserver.","m",30], | ||
|
||
|
||
["Webserver is Outdated.","h",45], | ||
|
||
|
||
["Some issues found with HTTP Options.","l",42], | ||
|
||
|
||
["CGI Directories Enumerated.","l",26], | ||
|
||
|
||
["Vulnerabilities reported in SSL Scans.","m",29], | ||
|
||
|
||
["Interesting Files Detected.","m",25], | ||
|
||
|
||
["Injectable Paths Detected.","l",46], | ||
|
||
|
||
["Found Subdomains with DNSMap.","m",31], | ||
|
||
|
||
["MS-SQL DB Service Detected.","l",47], | ||
|
||
|
||
["MySQL DB Service Detected.","l",47], | ||
|
||
|
||
["ORACLE DB Service Detected.","l",47], | ||
|
||
|
||
["RDP Server Detected over UDP.","h",48], | ||
|
||
|
||
["RDP Server Detected over TCP.","h",48], | ||
|
||
|
||
["TCP Ports are Open","l",8], | ||
|
||
|
||
["UDP Ports are Open","l",8], | ||
|
||
|
||
["SNMP Service Detected.","m",49], | ||
|
||
|
||
["Elmah is Configured.","m",50], | ||
|
||
|
||
["SMB Ports are Open over TCP","m",51], | ||
|
||
|
||
["SMB Ports are Open over UDP","m",51], | ||
|
||
|
||
["Wapiti discovered a range of vulnerabilities","h",30], | ||
|
||
|
||
["IIS WebDAV is Enabled","m",35], | ||
|
||
|
||
["X-XSS Protection is not Present","m",12], | ||
|
||
|
||
["Found Subdomains with AMass","m",31] | ||
|
||
|
||
|
||
] | ||
|
||
|
Oops, something went wrong.