Skip to content

ikpehlivan/mini-web-security-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Mini Web Security Scanner Logo

Mini Web Security Scanner

A lightweight Python-based CLI tool designed to perform basic web security checks such as:

  • Security header analysis
  • Heuristic reflected XSS detection
  • Heuristic error-based SQL Injection detection
  • Sensitive file and endpoint exposure checks

This project was built as a practical demonstration of fundamental web application security testing techniques.


⚠️ Disclaimer

This tool is intended for authorized security testing and educational purposes only. The findings produced are heuristic-based and must always be manually validated by a security professional. The author assumes no responsibility for misuse.


🎯 Project Goals

The main objectives of this project are:

  • Demonstrate core web application security testing logic
  • Build a clean, structured CLI security tool
  • Produce structured JSON-based reports
  • Showcase practical offensive security skills in a minimal codebase
  • Provide a foundation for future improvements

🧠 What This Scanner Does

1️⃣ Security Header Analysis

Checks for missing or weak HTTP security headers:

  • Content-Security-Policy
  • X-Content-Type-Options
  • X-Frame-Options
  • Referrer-Policy
  • Permissions-Policy
  • Strict-Transport-Security (HTTPS only)

Missing headers are reported as misconfiguration findings.


2️⃣ Reflected XSS (Heuristic Detection)

If query parameters exist:

  • Injects XSS payloads into parameters
  • Compares baseline vs injected response
  • Flags potential reflections

⚠️ This does NOT confirm exploitability. Manual validation is required.


3️⃣ Basic SQL Injection (Error-Based Detection)

Appends SQL payloads to query parameters Detects common database error patterns:

  • MySQL
  • PostgreSQL
  • MSSQL
  • Oracle
  • SQLite

Only error-based patterns are checked.


4️⃣ Sensitive Path Exposure

Attempts to access common sensitive endpoints:

  • /.env
  • /.git/config
  • /admin
  • /phpinfo.php
  • /server-status
  • /robots.txt
  • /.well-known/security.txt

Accessible sensitive resources are reported.


🔒 Ethical Use Only scan:

  • Applications you own.
  • Applications you have explicit written authorization to test.
  • Bug bounty programs that allow automated testing.
  • Never test production systems without permission.

About

A lightweight web vulnerability scanner implementing header inspection, heuristic reflected XSS detection, error-based SQLi checks, and exposure probing.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages