# 🔒 vuln_scanner
مكتبة **Python** احترافية لفحص واكتشاف أبرز الثغرات الأمنية في المواقع الإلكترونية.
تساعدك الأداة في تأمين مواقع الويب من خلال اكتشاف مجموعة من الثغرات الشائعة والخطيرة.
---
## 🚀 **المميزات**
- ✅ **XSS (Cross-Site Scripting):** فحص وإيجاد ثغرات إدخال السكريبت.
- ✅ **SQL Injection (SQLi):** فحص استغلال قواعد البيانات عبر استعلامات SQL.
- ✅ **Local File Inclusion (LFI):** فحص إدراج الملفات المحلية.
- ✅ **Remote File Inclusion (RFI):** فحص إدراج الملفات عن بُعد.
- ✅ **Sensitive Files & Directories Scanner:** اكتشاف الملفات والمجلدات الحساسة.
- ✅ **Subdomain Scanner:** فحص واكتشاف النطاقات الفرعية للمواقع.
---
## 📝 **الاستخدام**
### 🔍 **1. فحص ثغرات XSS**
```python
from vuln_scanner import scan_xss
url = "http://example.com/search?q=test"
scan_xss(url)
```
---
### 🔍 **2. فحص ثغرات SQL Injection**
```python
from vuln_scanner import scan_sql_injection
url = "http://example.com/product?id=1"
scan_sql_injection(url)
```
---
### 🔍 **3. فحص ثغرات LFI**
```python
from vuln_scanner import scan_lfi
url = "http://example.com/page.php?file=home"
scan_lfi(url)
```
---
### 🔍 **4. فحص ثغرات RFI**
```python
from vuln_scanner import scan_rfi
url = "http://example.com/page.php?file="
external_url = "http://malicious.com/shell.txt"
scan_rfi(url, external_url)
```
---
### 🔍 **5. فحص الملفات والدلائل الحساسة**
```python
from vuln_scanner import hidden_link_finder
url = "http://example.com"
wordlist = "common.txt"
hidden_link_finder(url, wordlist)
```
---
### 🔍 **6. فحص النطاقات الفرعية (Subdomain Scanner)**
```python
from vuln_scanner import subdomain_scanner
domain = "example.com"
wordlist = "subdomains.txt"
subdomain_scanner(domain, wordlist)
```
💡 **إذا كان لديك أي استفسارات أو اقتراحات، لا تتردد في التواصل!**
Raw data
{
"_id": null,
"home_page": "https://github.com/AL-MHIB/vuln_scanner",
"name": "vuln-scanner",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": null,
"keywords": "security scanner xss sql-injection lfi rfi subdomain-scanner",
"author": "ALMHEB",
"author_email": "appasqw107@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/d3/4d/6c45c1bc53f1b2fd8956bb8dd831ff1db365bcb82b09780c7484260cc995/vuln_scanner-1.0.0.tar.gz",
"platform": null,
"description": "\r\n# \ud83d\udd12 vuln_scanner\r\n\r\n\u0645\u0643\u062a\u0628\u0629 **Python** \u0627\u062d\u062a\u0631\u0627\u0641\u064a\u0629 \u0644\u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0623\u0628\u0631\u0632 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629. \r\n\u062a\u0633\u0627\u0639\u062f\u0643 \u0627\u0644\u0623\u062f\u0627\u0629 \u0641\u064a \u062a\u0623\u0645\u064a\u0646 \u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0648\u064a\u0628 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u062c\u0645\u0648\u0639\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0634\u0627\u0626\u0639\u0629 \u0648\u0627\u0644\u062e\u0637\u064a\u0631\u0629.\r\n\r\n---\r\n\r\n## \ud83d\ude80 **\u0627\u0644\u0645\u0645\u064a\u0632\u0627\u062a**\r\n\r\n- \u2705 **XSS (Cross-Site Scripting):** \u0641\u062d\u0635 \u0648\u0625\u064a\u062c\u0627\u062f \u062b\u063a\u0631\u0627\u062a \u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u0633\u0643\u0631\u064a\u0628\u062a. \r\n- \u2705 **SQL Injection (SQLi):** \u0641\u062d\u0635 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0642\u0648\u0627\u0639\u062f \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0628\u0631 \u0627\u0633\u062a\u0639\u0644\u0627\u0645\u0627\u062a SQL. \r\n- \u2705 **Local File Inclusion (LFI):** \u0641\u062d\u0635 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u062d\u0644\u064a\u0629. \r\n- \u2705 **Remote File Inclusion (RFI):** \u0641\u062d\u0635 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0639\u0646 \u0628\u064f\u0639\u062f. \r\n- \u2705 **Sensitive Files & Directories Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u0627\u0644\u0645\u062c\u0644\u062f\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629. \r\n- \u2705 **Subdomain Scanner:** \u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629 \u0644\u0644\u0645\u0648\u0627\u0642\u0639. \r\n\r\n---\r\n\r\n## \ud83d\udcdd **\u0627\u0644\u0627\u0633\u062a\u062e\u062f\u0627\u0645**\r\n\r\n### \ud83d\udd0d **1. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a XSS**\r\n\r\n```python\r\nfrom vuln_scanner import scan_xss\r\n\r\nurl = \"http://example.com/search?q=test\"\r\nscan_xss(url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **2. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a SQL Injection**\r\n\r\n```python\r\nfrom vuln_scanner import scan_sql_injection\r\n\r\nurl = \"http://example.com/product?id=1\"\r\nscan_sql_injection(url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **3. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a LFI**\r\n\r\n```python\r\nfrom vuln_scanner import scan_lfi\r\n\r\nurl = \"http://example.com/page.php?file=home\"\r\nscan_lfi(url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **4. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a RFI**\r\n\r\n```python\r\nfrom vuln_scanner import scan_rfi\r\n\r\nurl = \"http://example.com/page.php?file=\"\r\nexternal_url = \"http://malicious.com/shell.txt\"\r\nscan_rfi(url, external_url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **5. \u0641\u062d\u0635 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u0627\u0644\u062f\u0644\u0627\u0626\u0644 \u0627\u0644\u062d\u0633\u0627\u0633\u0629**\r\n\r\n```python\r\nfrom vuln_scanner import hidden_link_finder\r\n\r\nurl = \"http://example.com\"\r\nwordlist = \"common.txt\"\r\n\r\nhidden_link_finder(url, wordlist)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **6. \u0641\u062d\u0635 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629 (Subdomain Scanner)**\r\n\r\n```python\r\nfrom vuln_scanner import subdomain_scanner\r\n\r\ndomain = \"example.com\"\r\nwordlist = \"subdomains.txt\"\r\n\r\nsubdomain_scanner(domain, wordlist)\r\n```\r\n\r\n\r\n\r\n\ud83d\udca1 **\u0625\u0630\u0627 \u0643\u0627\u0646 \u0644\u062f\u064a\u0643 \u0623\u064a \u0627\u0633\u062a\u0641\u0633\u0627\u0631\u0627\u062a \u0623\u0648 \u0627\u0642\u062a\u0631\u0627\u062d\u0627\u062a\u060c \u0644\u0627 \u062a\u062a\u0631\u062f\u062f \u0641\u064a \u0627\u0644\u062a\u0648\u0627\u0635\u0644!**\r\n",
"bugtrack_url": null,
"license": null,
"summary": "\u0645\u0643\u062a\u0628\u0629 Python \u0644\u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0645\u062b\u0644 XSS\u060c SQL Injection\u060c LFI\u060c RFI\u060c \u0648\u0627\u0644\u0641\u062d\u0635 \u0627\u0644\u0645\u062a\u0642\u062f\u0645 \u0644\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0648\u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629.",
"version": "1.0.0",
"project_urls": {
"Homepage": "https://github.com/AL-MHIB/vuln_scanner"
},
"split_keywords": [
"security",
"scanner",
"xss",
"sql-injection",
"lfi",
"rfi",
"subdomain-scanner"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "e9bb45291e20b8797e8ff5c2f9daf305091dc48759b7e417a72ce6ba47dc3f40",
"md5": "f4f7340ef703d936b211b21115a56cf9",
"sha256": "b37a90e806e776c6a131cae591af2b6a7e6ed3c0472e795d18a19136906dd02b"
},
"downloads": -1,
"filename": "vuln_scanner-1.0.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "f4f7340ef703d936b211b21115a56cf9",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 11710,
"upload_time": "2025-01-17T06:27:01",
"upload_time_iso_8601": "2025-01-17T06:27:01.532270Z",
"url": "https://files.pythonhosted.org/packages/e9/bb/45291e20b8797e8ff5c2f9daf305091dc48759b7e417a72ce6ba47dc3f40/vuln_scanner-1.0.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "d34d6c45c1bc53f1b2fd8956bb8dd831ff1db365bcb82b09780c7484260cc995",
"md5": "a9ac15214da5b0dbdd957d4ce183f743",
"sha256": "e775f97d6b442a785d6000184de2f8256f891ac400e8a681bbfdc77f215002b3"
},
"downloads": -1,
"filename": "vuln_scanner-1.0.0.tar.gz",
"has_sig": false,
"md5_digest": "a9ac15214da5b0dbdd957d4ce183f743",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 9747,
"upload_time": "2025-01-17T06:27:02",
"upload_time_iso_8601": "2025-01-17T06:27:02.548862Z",
"url": "https://files.pythonhosted.org/packages/d3/4d/6c45c1bc53f1b2fd8956bb8dd831ff1db365bcb82b09780c7484260cc995/vuln_scanner-1.0.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-01-17 06:27:02",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "AL-MHIB",
"github_project": "vuln_scanner",
"github_not_found": true,
"lcname": "vuln-scanner"
}