_______________________________________________________________________________________________|
----------------------------------------------------------------------------------------------||
() \ ||
( ) \ ||
( ) \ ||
( ) \ ||
( ) \ ||
( ) \ ||
( )\ \ ||
( ) \ \ ||
____ \ \ ||
| | \ \ ||
| | \ \ ||
| | \ \ ||
| | \ \ ||
| | \ \ ||
|__| \ \ ||
/______ \ \ \ ||
||
( ) ||
\ ( O O ) / ||
\( | )/ ||
( () | () ) ||
( | ) ||
( () | () ) ||
/ ( | ) \ ||
/ (-----) \ ||
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
o
######## ** ** /|\ *=========+*
## # ** ** / | \ ==
## # ** ** | | | ==
## # ** ** | / \ | == ========
###### # ** ** | / \ | == ========
## # ** ** |/ \| == ==
## # ** ** /\ /\ == ==
## # *********** /__|_|__\_ == ==
####### *********** |__|__|___| *=========*
this is an automated tool used to scan a simple web application for vulnerabilities, mostly rest APIs.
The tool is scanning each end point for vulnerabilities.
To use the tool make sure that all the files are in the same directory and run the file Main.py. The tools scans for:
- SQL injection
- Cross site scripting
- Random input poisoning
The tool takes a command from the Options and applies it on the target URL. Check the Examples for a better idea.
[Options]{URL}
-h : More information
-q : Quit the tool
-s : SQL injection scan
-x : XSS Scan
-i : Random Input Scan
-s http://WebsiteName
-x http://WebsiteName
-i http://WebsiteName
-h




