8000 GitHub - SirCryptic/cwv-scanner: This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web application security vulnerabilities. The tool is designed to help website owners and security researchers identify vulnerabilities in their web applications that can be exploited by attackers.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web application security vulnerabilities. The tool is designed to help website owners and security researchers identify vulnerabilities in their web applications that can be exploited by attackers.

License

Notifications You must be signed in to change notification settings

SirCryptic/cwv-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Null Security Team

GitHub stars GitHub forks GitHub watchers
PyPI Downloads License

Common Web Application Vulnerability Scanner. [python Version]

This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to common web application security vulnerabilities. The tool is designed to help website owners and security researchers identify vulnerabilities in their web applications that can be exploited by attackers.

Installation

pip install cwv-scanner

Usage

cwv-scanner example.com

Vulnerabilities Checked by cwv-scanner

The scanner checks for the following 36 vulnerabilities:

Vulnerability Description
SQL Injection Injecting malicious SQL code into inputs to manipulate database queries.
XSS (Cross-Site Scripting) Injecting malicious scripts into web pages viewed by users.
File Inclusion Loading unauthorized files due to unsanitized user input.
Directory Traversal Accessing restricted directories via manipulated input paths.
Remote File Inclusion Including malicious code from remote servers via user input.
Command Injection Executing arbitrary commands by injecting malicious input.
Cross-Site Request Forgery (CSRF) Tricking users into submitting unauthorized requests.
Unrestricted File Upload Uploading malicious files that can be executed on the server.
Password Cracking Exploiting weak passwords to gain unauthorized access.
Session Hijacking Stealing session IDs to impersonate authenticated users.
Broken Auth and Session Management Bypassing authentication or hijacking sessions due to poor implementation.
Remote Code Execution Executing arbitrary code on the server via malicious input.
Local File Inclusion Loading local files that should not be accessible via user input.
Server Side Request Forgery (SSRF) Sending unauthorized requests to internal/external servers.
XML External Entity (XXE) Injection Exploiting XML parsing to access sensitive data or execute code.
Cross-Site Script Inclusion (XSSI) Loading external JavaScript to execute malicious code in the browser.
Server-Side Template Injection (SSTI) Injecting malicious code into server-side templates for execution.
HTML Injection Injecting malicious HTML to steal data or manipulate page content.
XPath Injection Manipulating XPath queries to access unauthorized data.
Code Injection Injecting executable code into the application to run on the server.
Object Injection Manipulating serialized objects to execute arbitrary code.
Cross-Domain Scripting Injecting scripts from external domains to steal browser data.
HTTP Response Splitting Injecting newlines into HTTP headers to manipulate responses.
Buffer Overflow Exploiting buffer overruns to execute arbitrary code.
Format String Attack Exploiting format string vulnerabilities to execute code.
Command Injection (Windows) Injecting commands into Windows systems via malicious input.
Insecure Cryptographic Storage Exploiting weak encryption to access sensitive data.
Insecure Direct Object References Accessing unauthorized resources via unvalidated input.
Insufficient Logging and Monitoring Failing to log or monitor security events, enabling undetected attacks.
Security Misconfiguration Exploiting misconfigured server or application settings.
Cross-Site Script Inclusion (CSSI) Including external stylesheets that could be controlled by attackers.
Click Fraud Generating fake ad clicks to manipulate revenue or budgets.
Broken Access Control Bypassing access controls to gain unauthorized access to resources.
Clickjacking Tricking users into clicking disguised malicious elements.
Hidden Form Fields Submitting unexpected data via hidden form fields to bypass validation.
Shellshock Exploiting Bash vulnerabilities to execute arbitrary code.

Credits

FootNote/s

  • Results cannot be 100% Gaurenteed

About

This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web application security vulnerabilities. The tool is designed to help website owners and security researchers identify vulnerabilities in their web applications that can be exploited by attackers.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

0