A lightweight Python-based CLI tool designed to perform basic web security checks such as:
- Security header analysis
- Heuristic reflected XSS detection
- Heuristic error-based SQL Injection detection
- Sensitive file and endpoint exposure checks
This project was built as a practical demonstration of fundamental web application security testing techniques.
This tool is intended for authorized security testing and educational purposes only. The findings produced are heuristic-based and must always be manually validated by a security professional. The author assumes no responsibility for misuse.
The main objectives of this project are:
- Demonstrate core web application security testing logic
- Build a clean, structured CLI security tool
- Produce structured JSON-based reports
- Showcase practical offensive security skills in a minimal codebase
- Provide a foundation for future improvements
Checks for missing or weak HTTP security headers:
- Content-Security-Policy
- X-Content-Type-Options
- X-Frame-Options
- Referrer-Policy
- Permissions-Policy
- Strict-Transport-Security (HTTPS only)
Missing headers are reported as misconfiguration findings.
If query parameters exist:
- Injects XSS payloads into parameters
- Compares baseline vs injected response
- Flags potential reflections
Appends SQL payloads to query parameters Detects common database error patterns:
- MySQL
- PostgreSQL
- MSSQL
- Oracle
- SQLite
Only error-based patterns are checked.
Attempts to access common sensitive endpoints:
- /.env
- /.git/config
- /admin
- /phpinfo.php
- /server-status
- /robots.txt
- /.well-known/security.txt
Accessible sensitive resources are reported.
🔒 Ethical Use Only scan:
- Applications you own.
- Applications you have explicit written authorization to test.
- Bug bounty programs that allow automated testing.
- Never test production systems without permission.
