This is an Python Web Application Scanner that uses customizable payloads to detect vulnerabilities such as SQL injection, XSS, LFI, and RCE.
- Clone the repository:
git clone https://github.com/alibakhshiilani/python-web-vulnerability-scanner.git
- Install the dependencies:
pip install -r requirements.txt
- Customize the payloads in the
payloads
directory as needed. - Update the configuration settings in
config.py
as needed. - Run the scanner:
python scanner.py
- View the report of vulnerabilities found in
report.txt
.
The scanner can be customized by editing the payloads in the payloads
directory and the configuration settings in config.py
. The scanner can be run using the scanner.py
script, and the results will be output to a report file specified in config.py
.
Here are some examples of how to use the Python Web Application Scanner:
# Run the scanner using the default configuration settings
python scanner.py
# Run the scanner using a custom report file
python scanner.py --report report.txt
# Run the scanner using a custom URL and HTTP methods
python scanner.py --url https://example.com/ --methods GET POST
# Run the scanner using a custom set of payloads
python scanner.py --payloads payloads/sql_injection.txt payloads/xss.txt
## License
This project is licensed under the MIT License. See LICENSE for more information.