A comprehensive, enterprise-grade vulnerability scanning platform with AI/ML-powered payload generation, zero-day detection, and threat intelligence integration.
- π Network Scanning: Port scanning, service detection, OS fingerprinting
- π― Vulnerability Detection: OWASP Top 10, CVE database integration
- π€ AI/ML Payload Generation: 15+ advanced algorithms for sophisticated attack simulation
- π¨ Zero-Day Detection: Pattern-based and behavioral anomaly detection
- π Threat Intelligence: Integration with 6+ threat intel feeds
- π Real-time Dashboard: Live scanning status and vulnerability tracking
- π Comprehensive Reports: PDF/JSON/CSV export capabilities
- π₯ Multi-user Support: Role-based access control
- π Secure Architecture: Session management, authentication, and authorization
- 15 Algorithms:
- Deep Neural Networks with Backpropagation
- Multi-Objective Genetic Algorithms
- Deep Q-Learning with Experience Replay
- Enhanced Particle Swarm Optimization
- Adversarial Training (GAN-style)
- Transformer-based Sequence Generation
- LSTM Neural Networks
- Simulated Annealing
- Ant Colony Optimization
- Bayesian Optimization
- Actor-Critic Reinforcement Learning
- Metamorphic Payload Generation
- Steganographic Encoding
- Adversarial ML Resistance
- Real-time Adaptive Learning
- Pattern-based vulnerability detection
- Behavioral anomaly analysis
- Time-based blind detection
- Response correlation analysis
- Active exploit detection (Log4Shell, Spring4Shell, ShellShock)
- CVE feed integration
- Exploit database correlation
- IOC (Indicators of Compromise) matching
- Real-time threat updates
- SQL Injection
- Cross-Site Scripting (XSS)
- Command Injection
- Path Traversal
- Template Injection
- XML External Entity (XXE)
- Deserialization Attacks
- LDAP Injection
- NoSQL Injection
- SSRF (Server-Side Request Forgery)
- Python 3.11+
- Redis Server
- Git
- Clone the repository
git clone https://github.com/faroq45/vuln-scanner-flask.git
cd vuln-scanner-flask- Create virtual environment
python -m venv env
# Windows
env\Scripts\activate
# Linux/Mac
source env/bin/activate- Install dependencies
pip install -r requirements.txt- Install additional WSGI server (optional)
# For Windows
pip install waitress
# For Linux/Unix
pip install gunicorn- Start Redis
# Windows (if installed as service)
net start redis
# Linux/Mac
redis-server- Run the application
Development Mode:
python main.pyProduction Mode (Windows):
python run_waitress.py
# or
start_production.batProduction Mode (Linux/Unix):
gunicorn -c gunicorn_config.py wsgi:application- Access the application
http://localhost:8080
vuln-scanner-flask/
βββ bin/ # Background worker processes
β βββ scanner.py # Port and service scanner
β βββ attacker.py # Vulnerability exploitation
β βββ scheduler.py # Scheduled scanning
βββ core/ # Core functionality
β βββ database.py # Database management (SQLite/PostgreSQL)
β βββ redis.py # Redis session management
β βββ workers.py # Worker thread management
β βββ payload_generator_enhanced.py # 8 AI/ML algorithms
β βββ payload_generator_ultra_enhanced.py # 15+ advanced algorithms
β βββ owasp_wrapper.py # OWASP scanner integration
β βββ ...
βββ rules/ # Vulnerability detection rules
β βββ vulnerabilities/ # Individual rule modules
β βββ rule_zeroday-detection.py
β βββ rule_zeroday-intelligence.py
β βββ rule_advanced-payload-detection.py
βββ views/ # Web interface views
βββ templates/ # HTML templates
βββ static/ # Static assets (CSS, JS, images)
βββ config.py # Main configuration
βββ config_zeroday.py # Zero-day detection config
βββ main.py # Application entry point
βββ wsgi.py # WSGI entry point
βββ requirements.txt # Python dependencies
# Web Server
WEB_HOST = '0.0.0.0'
WEB_PORT = 8080
WEB_DEBUG = False
# Redis
RDS_HOST = 'localhost'
RDS_PORT = 6379
# Database (PostgreSQL or SQLite)
DB_TYPE = 'postgresql' # or 'sqlite'
DB_HOST = 'localhost'
DB_PORT = 5432
DB_NAME = 'vuln_scanner'
DB_USER = 'your_user'
DB_PASSWORD = 'your_password'ZERODAY_ENABLED = True
ZERODAY_AGGRESSIVE_MODE = True
ZERODAY_MAX_PAYLOADS = 100
MACHINE_LEARNING_ENABLED = True- Navigate to
/signup - Create your account
- Login at
/login
- Go to Quick Scan or Assessment
- Enter target IP range or URL
- Configure scan options
- Click Start Scan
- View real-time progress in the dashboard
- Check discovered assets
- Review vulnerabilities as they're found
- Navigate to Reports
- Select scan session
- Export as PDF, JSON, or CSV
- β Session-based authentication
- β Password hashing (bcrypt)
- β SQL injection prevention
- β XSS protection
- β CSRF protection
- β Rate limiting on login attempts
- β Secure cookie handling
- β Content Security Policy headers
- β User activity logging
| Category | Tests |
|---|---|
| SQL Injection | Union-based, Boolean-based, Time-based, Error-based |
| XSS | Reflected, Stored, DOM-based |
| Command Injection | OS command, Code execution |
| Path Traversal | Directory traversal, File inclusion |
| Template Injection | SSTI (Jinja2, Smarty, etc.) |
| XXE | XML External Entity attacks |
| Deserialization | Pickle, YAML, JSON unsafe deserialization |
| Authentication | Weak passwords, Default credentials |
| Information Disclosure | Version disclosure, Debug info |
| Misconfigurations | Insecure headers, Missing patches |
Run the test suite:
# All tests
pytest
# Specific test file
pytest test_advanced_payloads.py
# With coverage
pytest --cov=core --cov-report=htmlContributions are welcome! Please follow these steps:
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
FOR EDUCATIONAL AND AUTHORIZED TESTING PURPOSES ONLY
This tool is designed for security professionals and researchers to test their own systems or systems they have explicit permission to test. Unauthorized access to computer systems is illegal.
The developers assume no liability and are not responsible for any misuse or damage caused by this program. Use at your own risk.
- @faroq45 - Creator and lead developer
- @obaidlone - Security features and vulnerability detection
- @shahidwan - Infrastructure and deployment
- @ASLAM1322 - Frontend and UI/UX
- OWASP for vulnerability classifications
- Nmap for port scanning
- Flask community for the excellent web framework
- Redis for session management
- All open-source contributors
For full contributor list, see CONTRIBUTORS.md
- Issues: GitHub Issues
- Discussions: GitHub Discussions
Built with β€οΈ by Security Researchers, for Security Researchers