AdvExploit is a powerful and easy-to-use web vulnerability scanner that helps you identify security flaws in your web applications. It provides two main scanning modes: a web vulnerability scan and an Nmap-based network scan.
- Web Vulnerability Scan: Performs a series of checks for common web vulnerabilities, including:
- SQL Injection
- Cross-Site Scripting (XSS)
- Insecure HTTP Headers
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- OS Command Injection
- Cross-Site Request Forgery (CSRF)
- Nmap Scan with Exploit Search: Uses the Nmap Scripting Engine to perform an in-depth vulnerability scan and automatically searches for known exploits in the Exploit-DB database using
searchsploit. - Reporting: Generates detailed reports in both JSON and HTML formats, organized by target.
The installation script will automatically detect your operating system and use the appropriate package manager to install the dependencies.
- Clone the repository:
git clone https://github.com/your-username/advexploit.git cd advexploit - Run the installation script:
chmod +x install.sh ./install.sh
The "Web Vulnerability Scan" is fully supported on Windows. The "Nmap Scan with Exploit Search" requires manual installation of nmap and searchsploit.
- Install Python 3: https://www.python.org/downloads/
- Install the required Python libraries:
pip install -r requirements.txt
- (Optional) Install Nmap: https://nmap.org/download.html
- (Optional) Install searchsploit: https://www.exploit-db.com/searchsploit
It is recommended to use a virtual environment to avoid conflicts with system-wide packages.
- Create a virtual environment:
python -m venv venv
- Activate the virtual environment:
- Linux/macOS:
source venv/bin/activate - Windows:
venv\Scripts\activate
- Linux/macOS:
- Install the dependencies:
pip install -r requirements.txt
Run the scanner with the following command:
python advexploit.pyYou will be presented with a menu to choose the type of scan you want to perform.
- More advanced scanning techniques: Implement more sophisticated checks for vulnerabilities like XXE, SSRF, and deserialization attacks.
- Authentication: Add support for scanning authenticated applications by allowing users to provide credentials or session cookies.
- Configuration: Allow users to configure the scanner's behavior through a configuration file (e.g., specify which tests to run, set custom payloads).
- GUI: Develop a graphical user interface to make the tool more accessible to a wider range of users.