Skip to content

Err0r-ICA/SCANter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SCANter - Web Security Scanner 🔎

📒 Description 📒

  • Detect This vulnerabilities
    • Remote Code Execution
      • Linux
    • XSS Reflected
    • Template Injection
      • Jinja2
      • ERB
      • Java
      • Twig
      • Freemarker
    • SQl Injection

📸 Screenshot 📸

Screenshot

OS Support

  • Kali Linux
  • Android - Termux
  • Windows

💿 Installation 💿

  • open your terminal
  • enter this command
    $ git clone https://github.com/Err0r-ICA/SCANter 
    $ cd SCANter
    $ python3 -m pip install -r requirements.txt
    

Android

  • Download Termux App
  • open termux app
  • enter this command
 $ pkg install python -y 
 $ pkg install git -y 
 $ git clone https://github.com/Err0r-ICA/SCANter
 $ cd SCANter
 $ python3 -m pip install -r requirements.txt

Windows

  • Download python3 and install it
  • open your cmd
  • enter this command
$ python3 -m pip install -r requirements.txt

🧾 Usage 🧾

Options:
  -h, --help          |    Show help message and exit
  --version           |    Show program's version number and exit
  -u URL, --url=URL   |    Target URL (e.g."http://www.target.com/vuln.php?id=1")
  --data=DATA         |    Data string to be sent through POST (e.g. "id=1")
  --list=FILE         |    Get All Urls from List
  --threads           |    Max number of concurrent HTTP(s) requests (default 10)
  --timeout           |    Seconds to wait before timeout connection
  --proxy             |    Start The Connection with http(s) proxy
  --cookies           |    HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
  --encode            |    How Many encode the payload (default 1)
  --allow-redirect    |    Allow the main redirect
  --verify            |    Skip HTTPS Cert Error
  --user-agent        |    add custom user-agent
  --scan-headers      |    Try to inject payloads in headers not parameters (user-agent,referrer)
  --skip-headers      |    Skip The Headers scanning processe
  --sleep             |    Sent one request after some Seconds
  --batch             |    Never ask for user input, use the default behavior
  --module            |    add custom module (e.g. "google.py")

☠️ Input Example ☠️

$ python3 ICAscanner -u 'http://localhost/dvwa/vulnerabilities/exec/' --data='ip=localhost&Submit=Submit' --cookies='PHPSESSID=safasf'

Build-passing Stars Coverage

Maintainers coded

Status License

Test