vuln-scanner


Namevuln-scanner JSON
Version 1.0.2 PyPI version JSON
download
home_pagehttps://github.com/AL-MHIB/
Summaryمكتبة Python احترافية لاكتشاف وتأمين المواقع من الثغرات الأمنية الشائعة مثل XSS، SQL Injection، LFI، RFI، وإجراء فحوصات متقدمة على الملفات الحساسة، النطاقات الفرعية، إعدادات CORS، SSL/TLS، ورؤوس الأمان، بالإضافة إلى فحص نقاط ضعف المصادقة وإعادة التوجيه المفتوح.
upload_time2025-01-19 03:44:19
maintainerNone
docs_urlNone
authorALMHEB
requires_python>=3.6
licenseNone
keywords security scanner xss sql-injection lfi rfi subdomain-scanner
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
# 🔒 vuln_scanner

مكتبة **Python** احترافية لفحص واكتشاف أبرز الثغرات الأمنية في المواقع الإلكترونية.  
تساعدك الأداة في تأمين مواقع الويب عبر اكتشاف مجموعة من الثغرات الشائعة والخطيرة.

---

## 🚀 **المميزات**

🔵 **XSS (Cross-Site Scripting):** فحص وإيجاد ثغرات إدخال السكريبت.  
🔵 **SQL Injection (SQLi):** فحص استغلال قواعد البيانات عبر استعلامات SQL.  
🔵 **Local File Inclusion (LFI):** فحص إدراج الملفات المحلية.  
🔵 **Remote File Inclusion (RFI):** فحص إدراج الملفات عن بُعد.  
🔵 **Sensitive Files & Directories Scanner:** اكتشاف الملفات والمجلدات الحساسة.  
🔵 **Subdomain Scanner:** فحص واكتشاف النطاقات الفرعية للمواقع.  
🔵 **CORS Misconfiguration Scanner:** اكتشاف التهيئة غير الآمنة لإعدادات CORS.  
🔵 **HTTP Methods Scanner:** فحص تفعيل طرق HTTP غير الآمنة.  
🔵 **CSRF Scanner:** اكتشاف غياب رموز CSRF في النماذج.  
🔵 **SSL/TLS Scanner:** فحص أمان شهادات SSL/TLS.  
🔵 **Open Redirect Scanner:** اكتشاف ثغرات إعادة التوجيه المفتوح.  
🔵 **File Upload Vulnerability Scanner:** فحص نقاط رفع الملفات لاكتشاف الثغرات.  
🔵 **Broken Authentication Scanner:** فحص ضعف آليات تسجيل الدخول والتحقق.  
🔵 **Directory Traversal Scanner:** فحص ثغرات اجتياز المجلدات للوصول غير المصرح به.  
🔵 **Clickjacking Scanner:** فحص الحماية من هجمات النقر المخادع.  
🔵 **Admin Panel Finder:** البحث عن لوحات التحكم الإدارية المكشوفة.  
🔵 **API Security Scanner:** فحص أمان واجهات برمجة التطبيقات (API).  
🔵 **GraphQL Security Scanner:** فحص أمان واجهات GraphQL.  
🔵 **File Inclusion Bypass Scanner:** اكتشاف طرق تجاوز حماية إدراج الملفات.  
🔵 **Advanced Reporting (PDF):** إنشاء تقارير احترافية بنتائج الفحص.  

---

## 📝 **الاستخدام**

### 🔍 **1. فحص ثغرات XSS**
```python
from vuln_scanner import scan_xss
url = "http://example.com/search?q=test"
scan_xss(url)
```

### 🔍 **2. فحص ثغرات SQL Injection**
```python
from vuln_scanner import scan_sql_injection
url = "http://example.com/product?id=1"
scan_sql_injection(url)
```

### 🔍 **3. فحص ثغرات LFI**
```python
from vuln_scanner import scan_lfi
url = "http://example.com/page.php?file=home"
scan_lfi(url)
```

### 🔍 **4. فحص ثغرات RFI**
```python
from vuln_scanner import scan_rfi
url = "http://example.com/page.php?file="
external_url = "http://malicious.com/shell.txt"
scan_rfi(url, external_url)
```

### 🔍 **5. فحص الملفات والدلائل الحساسة**
```python
from vuln_scanner import hidden_link_finder
url = "http://example.com"
wordlist = "common.txt"
hidden_link_finder(url, wordlist)
```

### 🔍 **6. فحص النطاقات الفرعية (Subdomain Scanner)**
```python
from vuln_scanner import subdomain_scanner
domain = "example.com"
wordlist = "subdomains.txt"
subdomain_scanner(domain, wordlist)
```

### 🔍 **7. فحص إعدادات CORS**
```python
from vuln_scanner import scan_cors
target_url = "https://example.com"
origin_url = "http://malicious.com"
scan_cors(target_url, origin_url)
```

### 🔍 **8. فحص رؤوس الأمان (Security Headers Scanner)**
```python
from vuln_scanner import scan_security_headers
url = "https://example.com"
scan_security_headers(url)
```

### 🔍 **9. فحص HTTP Methods**
```python
from vuln_scanner import scan_http_methods
url = "https://example.com"
scan_http_methods(url)
```

### 🔍 **10. فحص ثغرات CSRF**
```python
from vuln_scanner import scan_csrf
url = "https://example.com"
scan_csrf(url)
```

### 🔍 **11. فحص SSL/TLS**
```python
from vuln_scanner import scan_ssl_tls
domain = "example.com"
scan_ssl_tls(domain)
```
### 🔍 **🔍 12. فحص نقاط رفع الملفات
```python
from vuln_scanner import file_upload_vulnerability_scanner
url = "http://example.com/upload"
file_upload_vulnerability_scanner(url)
```
**

### 🔍 **🔍 13. فحص ضعف تسجيل الدخول
```python
from vuln_scanner import broken_authentication_scanner
url = "http://example.com/login"
broken_authentication_scanner(url)
```
**
### 🔍 **🔍 14. فحص اجتياز المجلدات
```python
from vuln_scanner import directory_traversal_scanner
url = "http://example.com/page?file="
directory_traversal_scanner(url)
```
**
### 🔍 **🔍 15. فحص Clickjacking
```python
from vuln_scanner import clickjacking_scanner
url = "http://example.com"
clickjacking_scanner(url)
```
**
### 🔍 **🔍  16. البحث عن لوحات التحكم الإدارية
```python
from vuln_scanner import admin_panel_finder
url = "http://example.com"
wordlist = "admin_panels.txt"
admin_panel_finder(url, wordlist)
```
**
### 🔍 **🔍  17. فحص أمان API
```python
from vuln_scanner import api_security_scanner
url = "http://api.example.com"
api_security_scanner(url)
```
**
### 🔍 **🔍  18. فحص أمان GraphQL
```python
from vuln_scanner import graphql_security_scanner
url = "http://example.com/graphql"
graphql_security_scanner(url)
```
**
### 🔍 **🔍 19. فحص تجاوز إدراج الملفات
```python
from vuln_scanner import file_inclusion_bypass_scanner
url = "http://example.com/page.php?file="
payloads = ["../../etc/passwd", "..\\..\\windows\\win.ini"]
file_inclusion_bypass_scanner(url, payloads)
```
**
### 🔍 **🔍  20. إنشاء تقرير احترافي (PDF)
```python
from vuln_scanner import generate_vulnerability_report
results = {
    "عنوان التقرير": "تقرير فحص الثغرات",
    "النتائج": [
        {"الثغرة": "XSS", "الوصف": "ثغرة XSS مكتشفة", "الحالة": "غير آمنة"},
        {"الثغرة": "SQLi", "الوصف": "ثغرة SQL Injection غير مكتشفة", "الحالة": "آمنة"}
    ]
}
generate_vulnerability_report(results)
```
**
---
## 📜 **التواصل**
📬 التواصل
💡 إذا كان لديك أي استفسارات أو اقتراحات، لا تتردد في التواصل عبر البريد الإلكتروني:
appasqw107@gmail.com
## **
## 📜 **الرخصة**

📝 هذه الأداة مرخصة تحت **MIT License**.

✨ **معًا لحماية المواقع وتأمين الإنترنت!** 😊

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/AL-MHIB/",
    "name": "vuln-scanner",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": null,
    "keywords": "security scanner xss sql-injection lfi rfi subdomain-scanner",
    "author": "ALMHEB",
    "author_email": "appasqw107@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/a8/b6/eb2fb5e515bf672b554053e0494dc19ddc5fc1895ad44ca2e4a834a64963/vuln_scanner-1.0.2.tar.gz",
    "platform": null,
    "description": "\r\n# \ud83d\udd12 vuln_scanner\r\n\r\n\u0645\u0643\u062a\u0628\u0629 **Python** \u0627\u062d\u062a\u0631\u0627\u0641\u064a\u0629 \u0644\u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0623\u0628\u0631\u0632 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629.  \r\n\u062a\u0633\u0627\u0639\u062f\u0643 \u0627\u0644\u0623\u062f\u0627\u0629 \u0641\u064a \u062a\u0623\u0645\u064a\u0646 \u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0648\u064a\u0628 \u0639\u0628\u0631 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u062c\u0645\u0648\u0639\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0634\u0627\u0626\u0639\u0629 \u0648\u0627\u0644\u062e\u0637\u064a\u0631\u0629.\r\n\r\n---\r\n\r\n## \ud83d\ude80 **\u0627\u0644\u0645\u0645\u064a\u0632\u0627\u062a**\r\n\r\n\ud83d\udd35 **XSS (Cross-Site Scripting):** \u0641\u062d\u0635 \u0648\u0625\u064a\u062c\u0627\u062f \u062b\u063a\u0631\u0627\u062a \u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u0633\u0643\u0631\u064a\u0628\u062a.  \r\n\ud83d\udd35 **SQL Injection (SQLi):** \u0641\u062d\u0635 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0642\u0648\u0627\u0639\u062f \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0628\u0631 \u0627\u0633\u062a\u0639\u0644\u0627\u0645\u0627\u062a SQL.  \r\n\ud83d\udd35 **Local File Inclusion (LFI):** \u0641\u062d\u0635 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u062d\u0644\u064a\u0629.  \r\n\ud83d\udd35 **Remote File Inclusion (RFI):** \u0641\u062d\u0635 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0639\u0646 \u0628\u064f\u0639\u062f.  \r\n\ud83d\udd35 **Sensitive Files & Directories Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u0627\u0644\u0645\u062c\u0644\u062f\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629.  \r\n\ud83d\udd35 **Subdomain Scanner:** \u0641\u062d\u0635 \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629 \u0644\u0644\u0645\u0648\u0627\u0642\u0639.  \r\n\ud83d\udd35 **CORS Misconfiguration Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062a\u0647\u064a\u0626\u0629 \u063a\u064a\u0631 \u0627\u0644\u0622\u0645\u0646\u0629 \u0644\u0625\u0639\u062f\u0627\u062f\u0627\u062a CORS.  \r\n\ud83d\udd35 **HTTP Methods Scanner:** \u0641\u062d\u0635 \u062a\u0641\u0639\u064a\u0644 \u0637\u0631\u0642 HTTP \u063a\u064a\u0631 \u0627\u0644\u0622\u0645\u0646\u0629.  \r\n\ud83d\udd35 **CSRF Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u063a\u064a\u0627\u0628 \u0631\u0645\u0648\u0632 CSRF \u0641\u064a \u0627\u0644\u0646\u0645\u0627\u0630\u062c.  \r\n\ud83d\udd35 **SSL/TLS Scanner:** \u0641\u062d\u0635 \u0623\u0645\u0627\u0646 \u0634\u0647\u0627\u062f\u0627\u062a SSL/TLS.  \r\n\ud83d\udd35 **Open Redirect Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0627\u062a \u0625\u0639\u0627\u062f\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0645\u0641\u062a\u0648\u062d.  \r\n\ud83d\udd35 **File Upload Vulnerability Scanner:** \u0641\u062d\u0635 \u0646\u0642\u0627\u0637 \u0631\u0641\u0639 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0644\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.  \r\n\ud83d\udd35 **Broken Authentication Scanner:** \u0641\u062d\u0635 \u0636\u0639\u0641 \u0622\u0644\u064a\u0627\u062a \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062f\u062e\u0648\u0644 \u0648\u0627\u0644\u062a\u062d\u0642\u0642.  \r\n\ud83d\udd35 **Directory Traversal Scanner:** \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a \u0627\u062c\u062a\u064a\u0627\u0632 \u0627\u0644\u0645\u062c\u0644\u062f\u0627\u062a \u0644\u0644\u0648\u0635\u0648\u0644 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0631\u062d \u0628\u0647.  \r\n\ud83d\udd35 **Clickjacking Scanner:** \u0641\u062d\u0635 \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u0646 \u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0646\u0642\u0631 \u0627\u0644\u0645\u062e\u0627\u062f\u0639.  \r\n\ud83d\udd35 **Admin Panel Finder:** \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0644\u0648\u062d\u0627\u062a \u0627\u0644\u062a\u062d\u0643\u0645 \u0627\u0644\u0625\u062f\u0627\u0631\u064a\u0629 \u0627\u0644\u0645\u0643\u0634\u0648\u0641\u0629.  \r\n\ud83d\udd35 **API Security Scanner:** \u0641\u062d\u0635 \u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0627\u062a \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a (API).  \r\n\ud83d\udd35 **GraphQL Security Scanner:** \u0641\u062d\u0635 \u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0627\u062a GraphQL.  \r\n\ud83d\udd35 **File Inclusion Bypass Scanner:** \u0627\u0643\u062a\u0634\u0627\u0641 \u0637\u0631\u0642 \u062a\u062c\u0627\u0648\u0632 \u062d\u0645\u0627\u064a\u0629 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a.  \r\n\ud83d\udd35 **Advanced Reporting (PDF):** \u0625\u0646\u0634\u0627\u0621 \u062a\u0642\u0627\u0631\u064a\u0631 \u0627\u062d\u062a\u0631\u0627\u0641\u064a\u0629 \u0628\u0646\u062a\u0627\u0626\u062c \u0627\u0644\u0641\u062d\u0635.  \r\n\r\n---\r\n\r\n## \ud83d\udcdd **\u0627\u0644\u0627\u0633\u062a\u062e\u062f\u0627\u0645**\r\n\r\n### \ud83d\udd0d **1. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a XSS**\r\n```python\r\nfrom vuln_scanner import scan_xss\r\nurl = \"http://example.com/search?q=test\"\r\nscan_xss(url)\r\n```\r\n\r\n### \ud83d\udd0d **2. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a SQL Injection**\r\n```python\r\nfrom vuln_scanner import scan_sql_injection\r\nurl = \"http://example.com/product?id=1\"\r\nscan_sql_injection(url)\r\n```\r\n\r\n### \ud83d\udd0d **3. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a LFI**\r\n```python\r\nfrom vuln_scanner import scan_lfi\r\nurl = \"http://example.com/page.php?file=home\"\r\nscan_lfi(url)\r\n```\r\n\r\n### \ud83d\udd0d **4. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a RFI**\r\n```python\r\nfrom vuln_scanner import scan_rfi\r\nurl = \"http://example.com/page.php?file=\"\r\nexternal_url = \"http://malicious.com/shell.txt\"\r\nscan_rfi(url, external_url)\r\n```\r\n\r\n### \ud83d\udd0d **5. \u0641\u062d\u0635 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u0627\u0644\u062f\u0644\u0627\u0626\u0644 \u0627\u0644\u062d\u0633\u0627\u0633\u0629**\r\n```python\r\nfrom vuln_scanner import hidden_link_finder\r\nurl = \"http://example.com\"\r\nwordlist = \"common.txt\"\r\nhidden_link_finder(url, wordlist)\r\n```\r\n\r\n### \ud83d\udd0d **6. \u0641\u062d\u0635 \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629 (Subdomain Scanner)**\r\n```python\r\nfrom vuln_scanner import subdomain_scanner\r\ndomain = \"example.com\"\r\nwordlist = \"subdomains.txt\"\r\nsubdomain_scanner(domain, wordlist)\r\n```\r\n\r\n### \ud83d\udd0d **7. \u0641\u062d\u0635 \u0625\u0639\u062f\u0627\u062f\u0627\u062a CORS**\r\n```python\r\nfrom vuln_scanner import scan_cors\r\ntarget_url = \"https://example.com\"\r\norigin_url = \"http://malicious.com\"\r\nscan_cors(target_url, origin_url)\r\n```\r\n\r\n### \ud83d\udd0d **8. \u0641\u062d\u0635 \u0631\u0624\u0648\u0633 \u0627\u0644\u0623\u0645\u0627\u0646 (Security Headers Scanner)**\r\n```python\r\nfrom vuln_scanner import scan_security_headers\r\nurl = \"https://example.com\"\r\nscan_security_headers(url)\r\n```\r\n\r\n### \ud83d\udd0d **9. \u0641\u062d\u0635 HTTP Methods**\r\n```python\r\nfrom vuln_scanner import scan_http_methods\r\nurl = \"https://example.com\"\r\nscan_http_methods(url)\r\n```\r\n\r\n### \ud83d\udd0d **10. \u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a CSRF**\r\n```python\r\nfrom vuln_scanner import scan_csrf\r\nurl = \"https://example.com\"\r\nscan_csrf(url)\r\n```\r\n\r\n### \ud83d\udd0d **11. \u0641\u062d\u0635 SSL/TLS**\r\n```python\r\nfrom vuln_scanner import scan_ssl_tls\r\ndomain = \"example.com\"\r\nscan_ssl_tls(domain)\r\n```\r\n### \ud83d\udd0d **\ud83d\udd0d 12. \u0641\u062d\u0635 \u0646\u0642\u0627\u0637 \u0631\u0641\u0639 \u0627\u0644\u0645\u0644\u0641\u0627\u062a\r\n```python\r\nfrom vuln_scanner import file_upload_vulnerability_scanner\r\nurl = \"http://example.com/upload\"\r\nfile_upload_vulnerability_scanner(url)\r\n```\r\n**\r\n\r\n### \ud83d\udd0d **\ud83d\udd0d 13. \u0641\u062d\u0635 \u0636\u0639\u0641 \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062f\u062e\u0648\u0644\r\n```python\r\nfrom vuln_scanner import broken_authentication_scanner\r\nurl = \"http://example.com/login\"\r\nbroken_authentication_scanner(url)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d 14. \u0641\u062d\u0635 \u0627\u062c\u062a\u064a\u0627\u0632 \u0627\u0644\u0645\u062c\u0644\u062f\u0627\u062a\r\n```python\r\nfrom vuln_scanner import directory_traversal_scanner\r\nurl = \"http://example.com/page?file=\"\r\ndirectory_traversal_scanner(url)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d 15. \u0641\u062d\u0635 Clickjacking\r\n```python\r\nfrom vuln_scanner import clickjacking_scanner\r\nurl = \"http://example.com\"\r\nclickjacking_scanner(url)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d  16. \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0644\u0648\u062d\u0627\u062a \u0627\u0644\u062a\u062d\u0643\u0645 \u0627\u0644\u0625\u062f\u0627\u0631\u064a\u0629\r\n```python\r\nfrom vuln_scanner import admin_panel_finder\r\nurl = \"http://example.com\"\r\nwordlist = \"admin_panels.txt\"\r\nadmin_panel_finder(url, wordlist)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d  17. \u0641\u062d\u0635 \u0623\u0645\u0627\u0646 API\r\n```python\r\nfrom vuln_scanner import api_security_scanner\r\nurl = \"http://api.example.com\"\r\napi_security_scanner(url)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d  18. \u0641\u062d\u0635 \u0623\u0645\u0627\u0646 GraphQL\r\n```python\r\nfrom vuln_scanner import graphql_security_scanner\r\nurl = \"http://example.com/graphql\"\r\ngraphql_security_scanner(url)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d 19. \u0641\u062d\u0635 \u062a\u062c\u0627\u0648\u0632 \u0625\u062f\u0631\u0627\u062c \u0627\u0644\u0645\u0644\u0641\u0627\u062a\r\n```python\r\nfrom vuln_scanner import file_inclusion_bypass_scanner\r\nurl = \"http://example.com/page.php?file=\"\r\npayloads = [\"../../etc/passwd\", \"..\\\\..\\\\windows\\\\win.ini\"]\r\nfile_inclusion_bypass_scanner(url, payloads)\r\n```\r\n**\r\n### \ud83d\udd0d **\ud83d\udd0d  20. \u0625\u0646\u0634\u0627\u0621 \u062a\u0642\u0631\u064a\u0631 \u0627\u062d\u062a\u0631\u0627\u0641\u064a (PDF)\r\n```python\r\nfrom vuln_scanner import generate_vulnerability_report\r\nresults = {\r\n    \"\u0639\u0646\u0648\u0627\u0646 \u0627\u0644\u062a\u0642\u0631\u064a\u0631\": \"\u062a\u0642\u0631\u064a\u0631 \u0641\u062d\u0635 \u0627\u0644\u062b\u063a\u0631\u0627\u062a\",\r\n    \"\u0627\u0644\u0646\u062a\u0627\u0626\u062c\": [\r\n        {\"\u0627\u0644\u062b\u063a\u0631\u0629\": \"XSS\", \"\u0627\u0644\u0648\u0635\u0641\": \"\u062b\u063a\u0631\u0629 XSS \u0645\u0643\u062a\u0634\u0641\u0629\", \"\u0627\u0644\u062d\u0627\u0644\u0629\": \"\u063a\u064a\u0631 \u0622\u0645\u0646\u0629\"},\r\n        {\"\u0627\u0644\u062b\u063a\u0631\u0629\": \"SQLi\", \"\u0627\u0644\u0648\u0635\u0641\": \"\u062b\u063a\u0631\u0629 SQL Injection \u063a\u064a\u0631 \u0645\u0643\u062a\u0634\u0641\u0629\", \"\u0627\u0644\u062d\u0627\u0644\u0629\": \"\u0622\u0645\u0646\u0629\"}\r\n    ]\r\n}\r\ngenerate_vulnerability_report(results)\r\n```\r\n**\r\n---\r\n## \ud83d\udcdc **\u0627\u0644\u062a\u0648\u0627\u0635\u0644**\r\n\ud83d\udcec \u0627\u0644\u062a\u0648\u0627\u0635\u0644\r\n\ud83d\udca1 \u0625\u0630\u0627 \u0643\u0627\u0646 \u0644\u062f\u064a\u0643 \u0623\u064a \u0627\u0633\u062a\u0641\u0633\u0627\u0631\u0627\u062a \u0623\u0648 \u0627\u0642\u062a\u0631\u0627\u062d\u0627\u062a\u060c \u0644\u0627 \u062a\u062a\u0631\u062f\u062f \u0641\u064a \u0627\u0644\u062a\u0648\u0627\u0635\u0644 \u0639\u0628\u0631 \u0627\u0644\u0628\u0631\u064a\u062f \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a:\r\nappasqw107@gmail.com\r\n## **\r\n## \ud83d\udcdc **\u0627\u0644\u0631\u062e\u0635\u0629**\r\n\r\n\ud83d\udcdd \u0647\u0630\u0647 \u0627\u0644\u0623\u062f\u0627\u0629 \u0645\u0631\u062e\u0635\u0629 \u062a\u062d\u062a **MIT License**.\r\n\r\n\u2728 **\u0645\u0639\u064b\u0627 \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u0648\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a!** \ud83d\ude0a\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "\u0645\u0643\u062a\u0628\u0629 Python \u0627\u062d\u062a\u0631\u0627\u0641\u064a\u0629 \u0644\u0627\u0643\u062a\u0634\u0627\u0641 \u0648\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u0634\u0627\u0626\u0639\u0629 \u0645\u062b\u0644 XSS\u060c SQL Injection\u060c LFI\u060c RFI\u060c \u0648\u0625\u062c\u0631\u0627\u0621 \u0641\u062d\u0648\u0635\u0627\u062a \u0645\u062a\u0642\u062f\u0645\u0629 \u0639\u0644\u0649 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629\u060c \u0627\u0644\u0646\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0641\u0631\u0639\u064a\u0629\u060c \u0625\u0639\u062f\u0627\u062f\u0627\u062a CORS\u060c SSL/TLS\u060c \u0648\u0631\u0624\u0648\u0633 \u0627\u0644\u0623\u0645\u0627\u0646\u060c \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0641\u062d\u0635 \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0648\u0625\u0639\u0627\u062f\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0645\u0641\u062a\u0648\u062d.",
    "version": "1.0.2",
    "project_urls": {
        "Homepage": "https://github.com/AL-MHIB/"
    },
    "split_keywords": [
        "security",
        "scanner",
        "xss",
        "sql-injection",
        "lfi",
        "rfi",
        "subdomain-scanner"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "a64f05b91b53952ce683a22a36e529aab1202bc1fb3762bbfc49ff7dcd21ea2f",
                "md5": "6321e50f759e19b505d574fb3d9dd764",
                "sha256": "e01c632424cc5e1ce6d584b3cf5bcf0a992d28b6eedeb447711f0acb93307b73"
            },
            "downloads": -1,
            "filename": "vuln_scanner-1.0.2-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "6321e50f759e19b505d574fb3d9dd764",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.6",
            "size": 28177,
            "upload_time": "2025-01-19T03:44:17",
            "upload_time_iso_8601": "2025-01-19T03:44:17.604825Z",
            "url": "https://files.pythonhosted.org/packages/a6/4f/05b91b53952ce683a22a36e529aab1202bc1fb3762bbfc49ff7dcd21ea2f/vuln_scanner-1.0.2-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "a8b6eb2fb5e515bf672b554053e0494dc19ddc5fc1895ad44ca2e4a834a64963",
                "md5": "6fec2bdc8ccb023b761578507c4305e1",
                "sha256": "1e4f29f5ec3444c808d588d65cc3c68ffe3f31ac734f26a00fa3bbe2c8124720"
            },
            "downloads": -1,
            "filename": "vuln_scanner-1.0.2.tar.gz",
            "has_sig": false,
            "md5_digest": "6fec2bdc8ccb023b761578507c4305e1",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 19325,
            "upload_time": "2025-01-19T03:44:19",
            "upload_time_iso_8601": "2025-01-19T03:44:19.492600Z",
            "url": "https://files.pythonhosted.org/packages/a8/b6/eb2fb5e515bf672b554053e0494dc19ddc5fc1895ad44ca2e4a834a64963/vuln_scanner-1.0.2.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-01-19 03:44:19",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "vuln-scanner"
}
        
Elapsed time: 0.37654s