Skip to content

ahirankush771/vulnscan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ VulnScan β€” Web Vulnerability Scanner

VulnScan Banner Python Platform License Author

A powerful, beginner-friendly web vulnerability scanner built for ethical hackers and security researchers.

Developed by Ankush | CSE β€” Cybersecurity Engineer


⚠️ Legal Disclaimer

This tool is strictly for educational purposes and authorized security testing only.

  • βœ… Use on your own websites
  • βœ… Use in authorized Bug Bounty programs (in-scope targets only)
  • βœ… Use in paid/authorized penetration testing engagements
  • ❌ DO NOT scan websites without written permission from the owner
  • ❌ Unauthorized scanning is a criminal offense under IT Act, CFAA, and cybercrime laws worldwide

The developer is not responsible for any misuse of this tool.


πŸ“Έ Preview

β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—     β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—
β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘
β•šβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘
 β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘
  β•šβ•β•β•β•   β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β•β•β•

           Web Vulnerability Scanner v1.0.0
  Developer: Ankush  |  CSE (Cybersecurity Engineer)

πŸ” What Does VulnScan Check?

Module What It Detects Why It Matters
🌐 DNS & IP Info IP address, reverse DNS Reconnaissance info
πŸ”Œ Port Scanner Open ports (FTP, SSH, MySQL, etc.) Exposed services = attack surface
πŸ”’ SSL/TLS Check Certificate validity, expiry Expired cert = MITM attack risk
πŸ“‹ HTTP Headers Missing security headers Headers prevent XSS, Clickjacking, etc.
πŸ“ Sensitive Files .env, .git, backup.sql, admin panels Data/credential exposure
πŸ’‰ SQL Injection Error-based SQLi detection DB can be stolen or wiped
⚑ XSS Detection Reflected XSS payload test Session hijacking, phishing
πŸͺ Cookie Security HttpOnly, Secure, SameSite flags Prevent cookie theft

πŸš€ Installation & Setup

🐧 Linux (Ubuntu/Debian/Kali)

# Step 1: Clone the repository
git clone https://github.com/yourusername/vulnscan.git

# Step 2: Go into the folder
cd vulnscan

# Step 3: Make the script executable
chmod +x vulnscan.py

# Step 4: Run it!
python3 vulnscan.py example.com

πŸ“± Termux (Android)

# Step 1: Update Termux packages
pkg update && pkg upgrade -y

# Step 2: Install Python
pkg install python -y

# Step 3: Clone the repository
pkg install git -y
git clone https://github.com/yourusername/vulnscan.git

# Step 4: Go into the folder
cd vulnscan

# Step 5: Run it!
python3 vulnscan.py example.com

🍎 macOS

# Step 1: Install Python (if not installed)
brew install python3

# Step 2: Clone the repository
git clone https://github.com/yourusername/vulnscan.git

# Step 3: Enter folder
cd vulnscan

# Step 4: Run it!
python3 vulnscan.py example.com

πŸ“– Usage

# Basic usage
python3 vulnscan.py <target>

# Examples
python3 vulnscan.py example.com
python3 vulnscan.py https://testsite.com
python3 vulnscan.py 192.168.1.1

βœ… You can provide the target with or without https:// β€” VulnScan handles it automatically.


πŸ“Š Sample Output

──────────────────────────────────────────────────────────
  πŸ” HTTP Security Headers
──────────────────────────────────────────────────────────
  [VULN]  Strict-Transport-Security β€” NOT SET (HSTS Missing)
          ↳ Forces browser to always use HTTPS. Without it, attackers can downgrade to HTTP.

  [SAFE]  X-Content-Type-Options is set βœ“

  [VULN]  Content-Security-Policy β€” NOT SET (No CSP β€” XSS Risk Higher)
          ↳ CSP restricts what scripts can run. Without it, XSS attacks are easier.

  [WARN]  Server header reveals: 'Apache/2.4.41' β€” Version info exposed!
          ↳ Knowing server version helps attackers find known CVEs to exploit.

──────────────────────────────────────────────────────────
  πŸ” Sensitive Files & Directory Exposure
──────────────────────────────────────────────────────────
  [VULN]  Environment File found at: /.env
          ↳ May contain DB passwords, API keys, secret tokens!

  [SAFE]  /.git/config β€” Not found

πŸ› οΈ Requirements

  • Python 3.6+
  • No external libraries needed β€” uses only Python standard library
  • Works on any OS that supports Python

🧠 Understanding the Output

Each finding is labeled clearly so beginners can understand:

Label Meaning
[VULN] πŸ”΄ Vulnerability found β€” needs immediate attention
[WARN] 🟑 Potential issue β€” should be reviewed
[SAFE] 🟒 This check passed β€” no issue found
[INFO] πŸ”΅ General information β€” no action needed
↳ Explanation of WHY this is a problem

πŸ“‚ Project Structure

vulnscan/
β”‚
β”œβ”€β”€ vulnscan.py       # Main scanner tool
β”œβ”€β”€ README.md         # Documentation
└── LICENSE           # MIT License

πŸ—ΊοΈ Roadmap

  • DNS & IP Recon
  • Port Scanner
  • SSL/TLS Analysis
  • HTTP Security Headers
  • Sensitive File Detection
  • Basic SQLi Detection
  • Basic XSS Detection
  • Cookie Security Analysis
  • Subdomain Enumeration
  • WHOIS Lookup
  • Full Report Export (HTML/PDF)
  • CVE Lookup Integration
  • Multi-threading for faster scans
  • JSON/TXT output mode

🀝 Contributing

Contributions are welcome! Here's how:

# Fork the repo
# Create your feature branch
git checkout -b feature/new-module

# Commit your changes
git commit -m "Add: new vulnerability module"

# Push to branch
git push origin feature/new-module

# Open a Pull Request

πŸ‘¨β€πŸ’» Author

Ankush CSE β€” Cybersecurity Engineer

GitHub

"Hack Ethically. Defend Digitally."


πŸ“œ License

This project is licensed under the MIT License β€” see the LICENSE file for details.


⭐ If this tool helped you, please give it a star! ⭐

Made with ❀️ by Ankush | CSE (Cybersecurity Engineer)

About

Web Vulnerability Scanner by Ankush | CSE

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages