Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Err0r-ICA/SCANter

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SCANter - Web Security Scanner 🔎

📒 Description 📒

  • Detect This vulnerabilities
    • Remote Code Execution
      • Linux
    • XSS Reflected
    • Template Injection
      • Jinja2
      • ERB
      • Java
      • Twig
      • Freemarker
    • SQl Injection

📸 Screenshot 📸

Screenshot

OS Support

  • Kali Linux
  • Android - Termux
  • Windows

💿 Installation 💿

  • open your terminal
  • enter this command
    $ git clone https://github.com/Err0r-ICA/SCANter 
    $ cd SCANter
    $ python3 -m pip install -r requirements.txt
    

Android

  • Download Termux App
  • open termux app
  • enter this command
 $ pkg install python -y 
 $ pkg install git -y 
 $ git clone https://github.com/Err0r-ICA/SCANter
 $ cd SCANter
 $ python3 -m pip install -r requirements.txt

Windows

  • Download python3 and install it
  • open your cmd
  • enter this command
$ python3 -m pip install -r requirements.txt

🧾 Usage 🧾

Options:
  -h, --help          |    Show help message and exit
  --version           |    Show program's version number and exit
  -u URL, --url=URL   |    Target URL (e.g."http://www.target.com/vuln.php?id=1")
  --data=DATA         |    Data string to be sent through POST (e.g. "id=1")
  --list=FILE         |    Get All Urls from List
  --threads           |    Max number of concurrent HTTP(s) requests (default 10)
  --timeout           |    Seconds to wait before timeout connection
  --proxy             |    Start The Connection with http(s) proxy
  --cookies           |    HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
  --encode            |    How Many encode the payload (default 1)
  --allow-redirect    |    Allow the main redirect
  --verify            |    Skip HTTPS Cert Error
  --user-agent        |    add custom user-agent
  --scan-headers      |    Try to inject payloads in headers not parameters (user-agent,referrer)
  --skip-headers      |    Skip The Headers scanning processe
  --sleep             |    Sent one request after some Seconds
  --batch             |    Never ask for user input, use the default behavior
  --module            |    add custom module (e.g. "google.py")

☠️ Input Example ☠️

$ python3 ICAscanner -u 'http://localhost/dvwa/vulnerabilities/exec/' --data='ip=localhost&Submit=Submit' --cookies='PHPSESSID=safasf'

Build-passing Stars Coverage

Maintainers coded

Status License

Test

My Accounts

codeSTACKr | Instagram codeSTACKr | TikTok codeSTACKr | Telegram

Morty Proxy This is a proxified and sanitized view of the page, visit original site.