Site-Scanner - Web application vulnerability assessment tool.
- Ver 1.5: Few CMS variations added, Robots.txt disallow entries printing and Vulnerability report.
- Ver 1.6: Running time was reduced when preforming heavy tasks and community bug fixed.
- Ver 1.7.5: Directory Scanning feature added and URL pasing bug fixed.
- Basic Info: Quick site information (Load Time, IP Address, Server OS...).
- Robots.txt Disallow Entries: Detection of Robots.txt and printing Disallow Entries.
- CMS Detection: Automatically identifies the CMS used by a website (WordPress, Joomla, Drupal, etc.).
- Vulnerability Report: According to the indentified CMS will generate vulnerability report.
- Login Page Search: Searches for common login page variations based on the detected CMS.
- Directory Scanning: Searches for valid directories under the specified URL.
- SQL Injection Check: Tests for SQL injection vulnerabilities in query parameters.
- XSS Detection: Tests for SQL injection vulnerabilities in query parameters.
- User-Friendly Interface: Interactive and detailed shell menu.
- Multi-Threaded: Efficiently performs tasks in the background using threading.
- Python 3.x.x
- Required Python packages:
requests
,beautifulsoup4
- Clone the repository:
git clone https://github.com/TalMaIka/Site-Scanner.git
- Navigate to the project directory:
cd Site-Scanner
- Requirements Installation:
pip install -r requirements.txt
- Run the tool:
python3 Site-Scanner.py
/ Proxychainsproxychains python3 Site-Scanner.py
- Enter the URL of the website you want to analyze.
- Choose your tasks according to the menu.
Found a bug or want to contribute? Great! Please submit an issue or pull request.