A comprehensive, high-tech penetration testing toolkit for authorized security assessments. This tool provides extensive vulnerability scanning capabilities for web applications, APIs, and network services.
This tool is intended for authorized security testing ONLY.
Using this tool against websites without explicit permission from the owner is ILLEGAL and UNETHICAL. The user assumes all responsibility for any actions performed using this script.
- Web Crawling: Automated URL discovery with configurable depth
- Technology Fingerprinting: Detect CMS, frameworks, and server technologies
- Subdomain Enumeration: Discover subdomains via DNS resolution
- Port Scanning: Scan common ports for open services
- JavaScript Analysis: Extract API endpoints from JS files
- SQL Injection: Error-based and time-based blind SQLi detection
- Cross-Site Scripting (XSS): Reflected and DOM-based XSS testing
- Command Injection: OS command injection detection
- LDAP Injection: LDAP query manipulation testing
- Server-Side Template Injection (SSTI): Template engine exploitation
- XML External Entity (XXE): XML parser vulnerability testing
- CSRF Testing: Cross-Site Request Forgery detection
- Weak Credentials: Default/common password testing
- JWT Security: Token analysis and algorithm verification
- Session Management: Cookie security analysis
- REST API Testing: Common API vulnerability checks
- GraphQL Security: Introspection and query batching tests
- CORS Misconfiguration: Cross-origin resource sharing analysis
- Rate Limiting: Brute force protection detection
- HTTP Security Headers: CSP, HSTS, X-Frame-Options, etc.
- TLS/SSL Analysis: Certificate and cipher suite verification
- Cookie Security: Secure, HttpOnly, SameSite attributes
- Information Disclosure: Sensitive file exposure detection
- JSON Reports: Machine-readable output
- HTML Reports: Beautiful, interactive reports
- Console Output: Color-coded real-time results
- Severity Classification: CRITICAL, HIGH, MEDIUM, LOW, INFO
# Clone the repository
git clone https://github.com/MiChaelinzo/Advanced-Penetration-Testing-Script.git
# Navigate to the directory
cd Advanced-Penetration-Testing-Script
# Install dependencies
pip install -r requirements.txtpython penetration_testing3.pyOr with URL:
python penetration_testing3.py https://example.compython scanner.py https://example.compython scanner.py https://example.com --full-scan# Scan with port scanning and subdomain enumeration
python scanner.py https://example.com --scan-ports --enum-subdomains
# Save HTML report
python scanner.py https://example.com -o report.html --format html
# Use custom payload files
python scanner.py https://example.com --sqli-payloads sqli.txt --xss-payloads xss.txt
# Ignore SSL certificate errors
python scanner.py https://self-signed.local --no-verify-ssl
# Verbose output
python scanner.py https://example.com -v --full-scanTarget:
url Target website URL (e.g., https://example.com)
Scan Options:
--full-scan Enable all scan features
--crawl Enable web crawling (default: enabled)
--no-crawl Disable web crawling
--crawl-depth N Maximum crawl depth (default: 2)
--max-pages N Maximum pages to crawl (default: 50)
--scan-ports Enable port scanning
--enum-subdomains Enable subdomain enumeration
--test-creds Test for weak credentials (default: enabled)
--no-test-creds Disable credential testing
Payload Files:
--sqli-payloads FILE Custom SQL injection payloads
--xss-payloads FILE Custom XSS payloads
--dir-payloads FILE Custom directory traversal payloads
--username-list FILE Custom usernames for testing
--password-list FILE Custom passwords for testing
Output Options:
-o, --output FILE Output file for report
--format {json,html} Report format (default: json)
-v, --verbose Enable verbose output
-q, --quiet Minimal output
Connection Options:
--no-verify-ssl Disable SSL certificate verification
--timeout N Request timeout in seconds (default: 10)
--threads N Number of concurrent threads (default: 10)
Advanced-Penetration-Testing-Script/
βββ scanner.py # Main advanced scanner with full features
βββ penetration_testing3.py # Quick interactive scanner
βββ requirements.txt # Python dependencies
βββ README.md # Documentation
βββ LICENSE # MIT License
βββ .github/
βββ FUNDING.yml
βββ ISSUE_TEMPLATE/
| Category | Tests |
|---|---|
| Injection | SQL Injection, XSS, Command Injection, LDAP Injection, SSTI, XXE |
| Authentication | CSRF, Weak Credentials, Broken Session Management |
| Security Headers | CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy |
| TLS/SSL | Certificate Validation, Protocol Version, Cipher Strength |
| API Security | CORS, GraphQL Introspection, JWT Analysis, Rate Limiting |
| Information Disclosure | Directory Traversal, Sensitive Files, Debug Mode |
| Other | Clickjacking, Open Redirect, Insecure File Upload, SSRF |
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Advanced Web Vulnerability Scanner v2.0.0 β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
π Starting comprehensive scan on https://example.com
π‘ PHASE 1: Reconnaissance
----------------------------------------
π¬ Fingerprinting technologies...
β Detected: Nginx
β Detected: PHP
π·οΈ Starting web crawl...
Discovered 25 URLs, 8 JS files
π PHASE 2: Vulnerability Testing
----------------------------------------
π Testing for SQL Injection vulnerabilities...
π Testing for XSS vulnerabilities...
π Testing HTTP Security Headers...
[MEDIUM] Missing Security Header - CSP
============================================================
π SCAN RESULTS
============================================================
π Summary:
CRITICAL: 0
HIGH: 1
MEDIUM: 3
LOW: 5
INFO: 2
TOTAL: 11
πΎ Report saved to: report.html
We welcome contributions to improve and expand this project! Here's how you can help:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
- Additional vulnerability checks
- Improved detection accuracy
- Performance optimizations
- Documentation improvements
- Bug fixes
This project is for educational and authorized security testing purposes only.
- Always obtain proper authorization before testing any system
- Do not use this tool against systems you don't own or have permission to test
- The authors are not responsible for any misuse or damage caused by this tool
- This tool should not be used in a production environment without proper validation
This project is licensed under the MIT License - see the LICENSE file for details.
- Complete rewrite with modern Python practices
- Added async/concurrent scanning
- Added web crawling and URL discovery
- Added technology fingerprinting
- Added subdomain enumeration
- Added port scanning
- Added SSTI, XXE, LDAP injection testing
- Added JWT security analysis
- Added GraphQL security testing
- Added API security testing
- Added CORS testing
- Added HTML report generation
- Improved detection accuracy
- Color-coded console output
- Comprehensive documentation
- Initial release
- Basic vulnerability testing
- SQL injection, XSS, CSRF testing
- Cookie security analysis
- HTTP header checks
Made with β€οΈ for the security community
