Skip to content

A modular penetration testing toolkit for web/API/JWT/cloud vulnerability scanning.

License

Notifications You must be signed in to change notification settings

KshitijBhardwaj18/SecureScan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SecureScan - Advanced Web Vulnerability Scanner

By: Kshitij Bhardwaj=

 .oooooo..o                                                     .oooooo..o
d8P'    `Y8                                                    d8P'    `Y8
Y88bo.       .ooooo.   .ooooo.  oooo  oooo  oooo d8b  .ooooo.  Y88bo.       .ooooo.   .oooo.   ooo. .oo.
 `"Y8888o.  d88' `88b d88' `"Y8 `888  `888  `888""8P d88' `88b  `"Y8888o.  d88' `"Y8 `P  )88b  `888P"Y88b
     `"Y88b 888ooo888 888        888   888   888     888ooo888      `"Y88b 888        .oP"888   888   888
oo     .d8P 888    .o 888   .o8  888   888   888     888    .o oo     .d8P 888   .o8 d8(  888   888   888
8""88888P'  `Y8bod8P' `Y8bod8P'  `V88V"V8P' d888b    `Y8bod8P' 8""88888P'  `Y8bod8P' `Y888""8o o888o o888o

SecureScan is a modular penetration testing toolkit for web vulnerability scanning, with specialized scanners for API security, JWT authentication, and cloud misconfigurations.

🚀 Features

  • Core Scanner: Detects XSS, SQLi, open redirects, LFI, RCE
  • API Security Scanner: Tests endpoints for auth bypass, IDOR, rate limiting
  • JWT Scanner: Detects algorithm flaws, token forgery vulnerabilities
  • Cloud Scanner: Finds exposed credentials, storage buckets, SSRF to metadata services
  • Rich Terminal UI: Color-coded output with progress indicators
  • Detailed Reporting: JSON reports for integration with other tools

📋 Installation

# Clone repository
git clone https://github.com/KshitijBhardwaj18/SecureScan
cd securescan

# Install dependencies
pip install -r requirements.txt

🔍 Usage Guide

Workflow: Complete Assessment

For comprehensive testing:

  1. Initial scan:

    python scanners/SecureScan.py --url https://example.com --output findings.txt
  2. API security scan:

    python scanners/api_scanner.py --input findings.txt
  3. JWT authentication scan:

    python scanners/jwt_scanner.py --input findings.txt
  4. Cloud misconfiguration scan:

    python scanners/cloud_scanner.py --input findings.txt

Core Scanner Options

python scanners/securescan.py [options]

Options:
  --url URL             Target URL to scan
  --input FILE          File with URLs (one per line)
  --output FILE         Results output file (default: output_urls.txt)
  --timeout SEC         Request timeout (default: 15)
  --concurrency NUM     Concurrent requests (default: 5)
  --proxy FILE          Proxy list file

API Scanner Options

python scanners/api_scanner.py [options]

Options:
  --input FILE          URLs file to scan
  --url URL             Single URL to scan
  --output FILE         Results file (default: api_scan_results.json)
  --timeout SEC         Request timeout (default: 10)
  --concurrency NUM     Concurrent requests (default: 5)

JWT Scanner Options

python scanners/jwt_scanner.py [options]

Options:
  --input FILE          URLs file to scan
  --url URL             Single URL to scan
  --output FILE         Results file (default: jwt_scan_results.json)
  --timeout SEC         Request timeout (default: 10)
  --concurrency NUM     Concurrent requests (default: 5)

Cloud Scanner Options

python scanners/cloud_scanner.py [options]

Options:
  --input FILE          URLs file to scan
  --url URL             Single URL to scan
  --output FILE         Results file (default: cloud_scan_results.json)
  --timeout SEC         Request timeout (default: 10)
  --concurrency NUM     Concurrent requests (default: 5)
  --no-verify-ssl       Disable SSL verification

📊 Understanding Results

Findings are categorized by severity:

  • Critical: High potential for compromise, immediate action required
  • High: Serious vulnerability requiring prompt attention
  • Medium: Security issue that should be addressed
  • Low: Minor vulnerability with limited impact

Example output structure:

{
  "scan_date": "2025-04-15 04:19:09",
  "vulnerabilities": [
    {
      "url": "https://example.com/api/user",
      "vulnerability": "Missing Authentication",
      "severity": "Critical",
      "description": "Endpoint returns sensitive data without authentication",
      "evidence": "Response contains user information"
    }
  ]
}

📝 Scanning Tips

  1. Start small with specific targets to avoid false positives
  2. Use rate limiting to avoid being blocked
  3. Manually validate findings before reporting
  4. Always get permission before scanning systems you don't own

⚠️ Disclaimer

This tool is for security professionals to test systems with explicit permission. The developers are not responsible for misuse or damage. Use responsibly.


Made with ❤️ by Kshitij Bhardwaj

About

A modular penetration testing toolkit for web/API/JWT/cloud vulnerability scanning.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages