vuln-scanner


Namevuln-scanner JSON
Version 1.0.0 PyPI version JSON
download
home_pagehttps://github.com/AL-MHIB/vuln_scanner
Summaryمكتبة Python لفحص واكتشاف الثغرات الأمنية مثل XSS، SQL Injection، LFI، RFI، والفحص المتقدم للملفات الحساسة والنطاقات الفرعية.
upload_time2025-01-17 06:27:02
maintainerNone
docs_urlNone
authorALMHEB
requires_python>=3.6
licenseNone
keywords security scanner xss sql-injection lfi rfi subdomain-scanner
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
# 🔒 vuln_scanner

مكتبة **Python** احترافية لفحص واكتشاف أبرز الثغرات الأمنية في المواقع الإلكترونية.  
تساعدك الأداة في تأمين مواقع الويب من خلال اكتشاف مجموعة من الثغرات الشائعة والخطيرة.

---

## 🚀 **المميزات**

- ✅ **XSS (Cross-Site Scripting):** فحص وإيجاد ثغرات إدخال السكريبت.  
- ✅ **SQL Injection (SQLi):** فحص استغلال قواعد البيانات عبر استعلامات SQL.  
- ✅ **Local File Inclusion (LFI):** فحص إدراج الملفات المحلية.  
- ✅ **Remote File Inclusion (RFI):** فحص إدراج الملفات عن بُعد.  
- ✅ **Sensitive Files & Directories Scanner:** اكتشاف الملفات والمجلدات الحساسة.  
- ✅ **Subdomain Scanner:** فحص واكتشاف النطاقات الفرعية للمواقع.  

---

## 📝 **الاستخدام**

### 🔍 **1. فحص ثغرات XSS**

```python
from vuln_scanner import scan_xss

url = "http://example.com/search?q=test"
scan_xss(url)
```

---

### 🔍 **2. فحص ثغرات SQL Injection**

```python
from vuln_scanner import scan_sql_injection

url = "http://example.com/product?id=1"
scan_sql_injection(url)
```

---

### 🔍 **3. فحص ثغرات LFI**

```python
from vuln_scanner import scan_lfi

url = "http://example.com/page.php?file=home"
scan_lfi(url)
```

---

### 🔍 **4. فحص ثغرات RFI**

```python
from vuln_scanner import scan_rfi

url = "http://example.com/page.php?file="
external_url = "http://malicious.com/shell.txt"
scan_rfi(url, external_url)
```

---

### 🔍 **5. فحص الملفات والدلائل الحساسة**

```python
from vuln_scanner import hidden_link_finder

url = "http://example.com"
wordlist = "common.txt"

hidden_link_finder(url, wordlist)
```

---

### 🔍 **6. فحص النطاقات الفرعية (Subdomain Scanner)**

```python
from vuln_scanner import subdomain_scanner

domain = "example.com"
wordlist = "subdomains.txt"

subdomain_scanner(domain, wordlist)
```



💡 **إذا كان لديك أي استفسارات أو اقتراحات، لا تتردد في التواصل!**

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/AL-MHIB/vuln_scanner",
    "name": "vuln-scanner",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": null,
    "keywords": "security scanner xss sql-injection lfi rfi subdomain-scanner",
    "author": "ALMHEB",
    "author_email": "appasqw107@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/d3/4d/6c45c1bc53f1b2fd8956bb8dd831ff1db365bcb82b09780c7484260cc995/vuln_scanner-1.0.0.tar.gz",
    "platform": null,
    "description": "\r\n# \ud83d\udd12 vuln_scanner\r\n\r\n\u0645\u0643\u062a\u0628\u0629 **Python** \u0627\u062d\u062a\u0631\u0627\u0641\u064a\u0629 \u0644\u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0623\u0628\u0631\u0632 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629.  \r\n\u062a\u0633\u0627\u0639\u062f\u0643 \u0627\u0644\u0623\u062f\u0627\u0629 \u0641\u064a \u062a\u0623\u0645\u064a\u0646 \u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0648\u064a\u0628 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u062c\u0645\u0648\u0639\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0634\u0627\u0626\u0639\u0629 \u0648\u0627\u0644\u062e\u0637\u064a\u0631\u0629.\r\n\r\n---\r\n\r\n## \ud83d\ude80 **\u0627\u0644\u0645\u0645\u064a\u0632\u0627\u062a**\r\n\r\n- \u2705 **XSS (Cross-Site Scripting):** \u0641\u062d\u0635 \u0648\u0625\u064a\u062c\u0627\u062f \u062b\u063a\u0631\u0627\u062a \u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u0633\u0643\u0631\u064a\u0628\u062a.  \r\n- \u2705 **SQL Injection (SQLi):** \u0641\u062d\u0635 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0642\u0648\u0627\u0639\u062f \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0628\u0631 \u0627\u0633\u062a\u0639\u0644\u0627\u0645\u0627\u062a SQL.  \r\n- \u2705 **Local File Inclusion (LFI):** \u0641\u062d\u0635 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u062d\u0644\u064a\u0629.  \r\n- \u2705 **Remote File Inclusion (RFI):** \u0641\u062d\u0635 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0639\u0646 \u0628\u064f\u0639\u062f.  \r\n- \u2705 **Sensitive Files & Directories Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u0627\u0644\u0645\u062c\u0644\u062f\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629.  \r\n- \u2705 **Subdomain Scanner:** \u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629 \u0644\u0644\u0645\u0648\u0627\u0642\u0639.  \r\n\r\n---\r\n\r\n## \ud83d\udcdd **\u0627\u0644\u0627\u0633\u062a\u062e\u062f\u0627\u0645**\r\n\r\n### \ud83d\udd0d **1. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a XSS**\r\n\r\n```python\r\nfrom vuln_scanner import scan_xss\r\n\r\nurl = \"http://example.com/search?q=test\"\r\nscan_xss(url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **2. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a SQL Injection**\r\n\r\n```python\r\nfrom vuln_scanner import scan_sql_injection\r\n\r\nurl = \"http://example.com/product?id=1\"\r\nscan_sql_injection(url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **3. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a LFI**\r\n\r\n```python\r\nfrom vuln_scanner import scan_lfi\r\n\r\nurl = \"http://example.com/page.php?file=home\"\r\nscan_lfi(url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **4. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a RFI**\r\n\r\n```python\r\nfrom vuln_scanner import scan_rfi\r\n\r\nurl = \"http://example.com/page.php?file=\"\r\nexternal_url = \"http://malicious.com/shell.txt\"\r\nscan_rfi(url, external_url)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **5. \u0641\u062d\u0635 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u0627\u0644\u062f\u0644\u0627\u0626\u0644 \u0627\u0644\u062d\u0633\u0627\u0633\u0629**\r\n\r\n```python\r\nfrom vuln_scanner import hidden_link_finder\r\n\r\nurl = \"http://example.com\"\r\nwordlist = \"common.txt\"\r\n\r\nhidden_link_finder(url, wordlist)\r\n```\r\n\r\n---\r\n\r\n### \ud83d\udd0d **6. \u0641\u062d\u0635 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629 (Subdomain Scanner)**\r\n\r\n```python\r\nfrom vuln_scanner import subdomain_scanner\r\n\r\ndomain = \"example.com\"\r\nwordlist = \"subdomains.txt\"\r\n\r\nsubdomain_scanner(domain, wordlist)\r\n```\r\n\r\n\r\n\r\n\ud83d\udca1 **\u0625\u0630\u0627 \u0643\u0627\u0646 \u0644\u062f\u064a\u0643 \u0623\u064a \u0627\u0633\u062a\u0641\u0633\u0627\u0631\u0627\u062a \u0623\u0648 \u0627\u0642\u062a\u0631\u0627\u062d\u0627\u062a\u060c \u0644\u0627 \u062a\u062a\u0631\u062f\u062f \u0641\u064a \u0627\u0644\u062a\u0648\u0627\u0635\u0644!**\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "\u0645\u0643\u062a\u0628\u0629 Python \u0644\u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0645\u062b\u0644 XSS\u060c SQL Injection\u060c LFI\u060c RFI\u060c \u0648\u0627\u0644\u0641\u062d\u0635 \u0627\u0644\u0645\u062a\u0642\u062f\u0645 \u0644\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0648\u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629.",
    "version": "1.0.0",
    "project_urls": {
        "Homepage": "https://github.com/AL-MHIB/vuln_scanner"
    },
    "split_keywords": [
        "security",
        "scanner",
        "xss",
        "sql-injection",
        "lfi",
        "rfi",
        "subdomain-scanner"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "e9bb45291e20b8797e8ff5c2f9daf305091dc48759b7e417a72ce6ba47dc3f40",
                "md5": "f4f7340ef703d936b211b21115a56cf9",
                "sha256": "b37a90e806e776c6a131cae591af2b6a7e6ed3c0472e795d18a19136906dd02b"
            },
            "downloads": -1,
            "filename": "vuln_scanner-1.0.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "f4f7340ef703d936b211b21115a56cf9",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.6",
            "size": 11710,
            "upload_time": "2025-01-17T06:27:01",
            "upload_time_iso_8601": "2025-01-17T06:27:01.532270Z",
            "url": "https://files.pythonhosted.org/packages/e9/bb/45291e20b8797e8ff5c2f9daf305091dc48759b7e417a72ce6ba47dc3f40/vuln_scanner-1.0.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "d34d6c45c1bc53f1b2fd8956bb8dd831ff1db365bcb82b09780c7484260cc995",
                "md5": "a9ac15214da5b0dbdd957d4ce183f743",
                "sha256": "e775f97d6b442a785d6000184de2f8256f891ac400e8a681bbfdc77f215002b3"
            },
            "downloads": -1,
            "filename": "vuln_scanner-1.0.0.tar.gz",
            "has_sig": false,
            "md5_digest": "a9ac15214da5b0dbdd957d4ce183f743",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 9747,
            "upload_time": "2025-01-17T06:27:02",
            "upload_time_iso_8601": "2025-01-17T06:27:02.548862Z",
            "url": "https://files.pythonhosted.org/packages/d3/4d/6c45c1bc53f1b2fd8956bb8dd831ff1db365bcb82b09780c7484260cc995/vuln_scanner-1.0.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-01-17 06:27:02",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "AL-MHIB",
    "github_project": "vuln_scanner",
    "github_not_found": true,
    "lcname": "vuln-scanner"
}
        
Elapsed time: 0.75182s