Kali Linux

WSVuls : Website Vulnerability Scanner Detect Issues

WSVuls is a simple and powerful command line tool for Linux, Windows and macOS. It’s designed for developers/testers and for those workers in IT who want to test vulnerabilities and analyses website from a single command. It detects issues outdated software version, insecures HTTP headers, the long and useless requests

Why WSVuls ?

WSVuls can extract the following data while crawling:

Cloudflare
  • IP Address
  • Ports
  • Hex Headers
  • Protocol Version
Stats
  • First Byte
  • Start Render
  • FCP
  • Speed Index
  • LCP
  • CLS
  • TBT
  • DC Time
  • DC Requests
  • DC Bytes
  • Time
  • Requests
  • Total Bytes
Mapper
  • Resource
  • Request Start
  • Content Type
  • DNS Lookup
  • SSL Negotiation
  • Error/Status Code

Docker

WSVuls can be launched using docker

Build Image

$ git clone https://github.com/anouarbensaad/wsvuls
$ cd wsvuls
$ docker build -t wsvuls:latest .

Run a WSVuls container with interactive mode

$ docker run -it –name wsvuls wsvuls:latest -u facebook.com

Usage

Scan, Detect and get stats for a specific url
Examples:
To get stats from target url:
$ wsvuls stats -u facebook.com
To get map all requests:
$ wsvuls stats -u facebook.com –mapper
To detect a right ip address from cloudflare firewall:
$ wsvuls cloud -d facebook.com
by default use-proxy to bypass the limit rate.
Available Commands:
stats Get statistics of target website.
cloud Get the right data from cloudflare.
Flags:
-h, –help help for wsvuls

R K

Recent Posts

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…

16 hours ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…

16 hours ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…

16 hours ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…

16 hours ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…

17 hours ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…

20 hours ago