forked from Repozo/Web-Vulnerability-Scanner
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.py
83 lines (64 loc) · 2.37 KB
/
index.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
from flask import Flask , render_template , request , make_response
import pdfkit
import os
app= Flask(__name__)
@app.route('/')
def home():
return render_template("index.html")
@app.route('/ports', methods=["GET","POST"])
def ports():
import portScan
from portScan import portScanner2
ip=request.form['ipaddress']
res=portScanner2(ip)
return render_template("port.html", len=len(res) , pO=res)
@app.route('/xss', methods=["GET","POST"])
def xss():
import xssscan
from xssscan import check_xss
url=request.form['ipaddress']
result=check_xss(url)
return render_template("xss_scn.html",le=len(result),ur=url,p=result)
@app.route('/subdomain', methods=["GET","POST"])
def subdomain():
import subdomain
from subdomain import subfinder
url=request.form['ipaddress']
result=subfinder(url)
return render_template("subdomain.html",le=len(result),sublist=result)
@app.route('/sql', methods=["GET","POST"])
def sql():
import sql
from sql import scan_sql_injection
url=request.form['ipaddress']
result=scan_sql_injection(url)
return render_template("sql.html",le=len(result),sublist=result)
@app.route('/discover', methods=["GET","POST"])
def discover():
import filePathTraveral
from filePathTraveral import content_discovery
domain=request.form['ipaddress']
result=content_discovery(domain)
return render_template("filePathTraversal.html",le=len(result),sublist=result)
@app.route('/fullscan', methods=["GETS","POST"])
def fullscan():
import portScan
from portScan import portScanner2
import xssscan
from xssscan import check_xss
import subdomain
from subdomain import subfinder
import filePathTraveral
from filePathTraveral import content_discovery
url=request.form['ipaddress']
rePort=portScanner2(url)
reXss=check_xss(url)
resub=subfinder(url)
reFileTravesal=content_discovery(url)
rendered = render_template("allscan.html",leport=len(rePort),portre=rePort,lexss=len(reXss),ur=url,xssre=reXss,lesubdom=len(resub),resubdom=resub,lefile=len(reFileTravesal),refile=reFileTravesal)
pdf= pdfkit.from_string(rendered, False)
response=make_response(pdf)
response.headers['Content-Type']='application/pdf'
response.headers['Content-Disposition']= 'inline; filename=output.pdf'
return response
app.run(debug= True)