WebScan is a web vulnerability Scanning tool, which scans sites for SQL injection and XSS vulnerabilities

Overview

WebScan

WebScan is a web vulnerability Scanning tool, which scans sites for SQL injection and XSS vulnerabilities Which is a great tool for web pentesters. Coded in python3, CLI. WebScan is capable of scanning and detecting sql injection vulnerabilities across HTTP and HTTP sites.

Author

AnonyminHack5

Language

Python3

WebScan first crawls the site analyzing in-depth each file it finds, and displaying the entire website form structure. In the US, Nigeria, no federal law exists to ban port scanning, web scanning. However scanning without permission can get you into trouble

How does WebScan work?

While a network vulnerability scanner scans the web server itself, including its operating system, the webserver daemon and the various other open sources, such as database services running on the same system, WebScan or web application scanner focuses on the code of the application

WebScan-HOME

WebScab


Tested On

WebScan has been tested on the following debain and ubuntu based systems and shown to work perfectly

[+]Parrot OS security

[+]Kali Linux 2021

[+]Ubuntu

[+]Lubuntu

[+]Slax Linux

[+]BlackArch Linux

[+]And Others....

Features of WebScan

[1]SQL injection scanning support

[2]XSS scanning support

[3]Good UI

[4}Tests for Internet Connection

WebScan was coded with love from my heart, as i have worked on this project for some time

Requirements

[1]Internet Connection (Required!!)

[2]bs4

[3]Requests

[4]termcolor

[5]Colorama

[6]And Others....

Demo Video Usage


You are also free to download the video for a better understanding of how to use WebScan in your terminal

Feel free to download WebScan. Click here to download.

How to Install and Use in Any Terminal

cd $HOME

git clone https://github.com/TermuxHackz/WebScan.git

cd WebScan

pip install -r requirements.txt

python3 webscan.py

in Addition you can also download vuln sql sites here and vuln xSS site here

Contact Me

If you notice any bugs or wish to contact me personally, Contact me via my email [email protected]

Be Ethical

Owner
AnonyminHack5
Just a wonderful programmer and lover of shell and Python. π•Žπ”Ό 𝔸ℝ𝔼 π”Έβ„•π•†β„•π•π•„π•†π•Œπ•Š
AnonyminHack5
Use scrapli to retrieve security zone information from a Juniper SRX firewall

Get Security Zones with Scrapli Overview This example will show how to retrieve security zone information on Juniper's SRX firewalls. In addition to t

Calvin Remsburg 2 Jun 19, 2022
Keystroke logging, often referred to as keylogging or keyboard capturing

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware

Harsha G 2 Jan 11, 2022
Script checks provided domains for log4j vulnerability

log4j Script checks provided domains for log4j vulnerability. A token is created with canarytokens.org and passed as header at request for a single do

Matthias Nehls 2 Dec 12, 2021
Magicspoofing - A python3 script for search possible misconfiguration in a DNS related to security protections of email service from the domain name

A python3 script for search possible misconfiguration in a DNS related to security protections of email service from the domain name. This project is for educational use, we are not responsible for i

20 Dec 02, 2022
Windows Server 2016, 2019, 2022 Extracter & Recovery

Parsing files from Deduplicated volumes. It can also recover deleted files from NTFS Filesystem that were deduplicated. Installation git clone https:/

0 Aug 28, 2022
ShoLister - a tool that collects all available subdomains for specific hostname or organization from Shodan

ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be used from Penetration Tester and Bug Bounty Hunters.

Eslam Akl 45 Dec 28, 2022
Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, downloads, history, and more.

ChromePE [Linux/Windows] Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, download

Finn Lancaster 3 Oct 05, 2022
Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems

KCMTicketFormatter This tools takes the output from https://github.com/fireeye/SSSDKCMExtractor and turns it into properly formatted CCACHE files for

Black Lantern Security 35 Oct 25, 2022
Utility for Extracting all passwords from ConnectWise Automate

CWA Password Extractor Utility for Extracting all passwords from ConnectWise Automate (E.g. while migrating to a new system). Outputs a csv file with

Matthew Kyles 1 Dec 09, 2021
A Python application to predict what is cooking

ez-cuisine-classifier A Python application to predict what is cooking Environment Python 3.9 Windows 10 Install python -m venv venv .\venv\Scripts\act

Zeheng Li 1 Jun 21, 2022
PasswordManager is a command-line program that helps you manage your secret files like passwords

PasswordManager is a command-line program that helps you manage your secret files like passwords. It's very minimalistic and easy to use.

Michael 3 Dec 30, 2021
Threat research and reporting from IronNet's Threat Research Teams

IronNet Threat Research πŸ•΅οΈ Overview This repository contains IronNet's Threat Research. Research & Reporting πŸ“ Project Description Cobalt Strike Res

36 Dec 02, 2022
This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains a wordlist of all the files directories for this version.

webapp-wordlists This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version co

Podalirius 396 Jan 08, 2023
MS-FSRVP coercion abuse PoC

ShadowCoerce MS-FSRVP coercion abuse PoC Credits: Gilles LIONEL (a.k.a. Topotam)

Shutdown 219 Dec 28, 2022
TOOLS CRACK FACEBOOK

Installation $ pkg update && pkg upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Mark-Zuck/zafi $ cd zafi $ pip2 instal

Romi Afrizal 50 Dec 26, 2022
IDA loader for Apple's iBoot, SecureROM and AVPBooter

IDA iBoot Loader IDA loader for Apple's iBoot, SecureROM and AVPBooter Installation Copy iboot-loader.py to the loaders folder in IDA directory. Credi

matteyeux 74 Dec 23, 2022
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Dylan Meca 16 Dec 08, 2022
Chapter 1 of the AWS Cookbook

Chapter 1 - Security Set and export your default region: export AWS_REGION=us-east-1 Set your AWS ACCOUNT ID:: AWS_ACCOUNT_ID=$(aws sts get-caller-ide

AWS Cookbook 30 Nov 27, 2022
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries

A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including P

neeraj 95 Dec 26, 2022
BF-Hash - A Python Tool to decrypt hashes by brute force

BF-Hash Herramienta para descifrar hashes por fuerza bruta InstalaciΓ³n git clone

5 Apr 09, 2022