Skip to content

0xgetz/allowScanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

9 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

AllowScanner Logo

AllowScanner

Advanced Web Vulnerability Scanner

CI Python 3.10+ License: MIT Docker

Fast, async web security scanner for vulnerability detection, security header analysis, SSL/TLS auditing, DNS security checks, and more.


โœจ Features

Module Description
๐Ÿ” Vulnerability Scanner SQLi, XSS, SSRF, SSTI, Command Injection, XXE, Open Redirect, Directory Traversal
๐Ÿ›ก๏ธ Security Headers CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy
๐Ÿ” SSL/TLS Audit Certificate validation, expiry checks, weak ciphers, protocol version
๐ŸŒ DNS Security DNSSEC, SPF, DMARC, DKIM, CAA records
๐Ÿ› ๏ธ Technology Detection 30+ frameworks/servers: WordPress, React, Laravel, Nginx, Cloudflare, etc.
๐Ÿ”Ž Subdomain Enum DNS-based subdomain discovery (500+ common prefixes)
๐Ÿช Cookie Security Secure, HttpOnly, SameSite attribute checks
๐Ÿ”— CORS Analysis Wildcard, reflected origin, null origin, credentials misconfiguration
๐Ÿ“‚ Sensitive Files .env, .git, phpinfo.php, Spring Actuator, Swagger, etc.
๐Ÿ”‘ Admin Panels Discover exposed admin/login interfaces
๐Ÿ“Š Security Score 0โ€“100 score based on findings

๐Ÿš€ Quick Start

Install from source

git clone https://github.com/0xgetz/allowScanner.git
cd allowScanner
pip install -e .

Run a scan

# Basic scan
allowscanner https://example.com

# JSON output
allowscanner https://example.com -o report.json -f json

# High concurrency
allowscanner https://example.com -c 100

# Only specific modules
allowscanner https://example.com --only ssl,dns,headers

# Skip subdomain enumeration
allowscanner https://example.com --no-subdomains

Docker

docker build -t allowscanner .
docker run --rm allowscanner https://example.com

๐Ÿ“– Usage

allowscanner [OPTIONS] URL

Positional:
  url                     Target URL to scan

Options:
  -o, --output FILE       Save report to file
  -f, --format FORMAT     Output format: terminal | json | markdown
  -c, --concurrency N     Max concurrent requests (default: 50)
  -t, --timeout N         Request timeout in seconds (default: 15)
  -v, --verbose           Verbose output
  --no-color              Disable colored output

Module toggles:
  --no-ssl                Skip SSL/TLS checks
  --no-dns                Skip DNS security checks
  --no-headers            Skip security header checks
  --no-vulns              Skip vulnerability scans
  --no-admin              Skip admin panel discovery
  --no-sensitive          Skip sensitive file checks
  --no-tech               Skip technology detection
  --no-subdomains         Skip subdomain enumeration
  --no-cors               Skip CORS checks
  --no-cookies            Skip cookie security checks
  --only MODULES          Only run specific modules (comma-separated)
                          Modules: ssl,dns,headers,vulns,tech,subdomains,cors,cookies,admin,sensitive

๐Ÿ“Š Example Output

โ•ญโ”€โ”€โ”€โ”€ ๐Ÿ“Š Scan Summary โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ
โ”‚  Target: https://example.com                          โ”‚
โ”‚  Domain: example.com                                  โ”‚
โ”‚  Duration: 4.2s                                       โ”‚
โ”‚  Score: 72/100                                        โ”‚
โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ

โ•ญโ”€โ”€โ”€โ”€ โš ๏ธ Vulnerability Summary โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ
โ”‚  Critical: 1  High: 2  Medium: 4  Low: 3             โ”‚
โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ

โ”Œโ”€โ”€โ”€ ๐Ÿ” Detailed Findings โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ #  โ”‚ Severity โ”‚ Finding              โ”‚ CWE    โ”‚      โ”‚
โ”‚โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”‚      โ”‚
โ”‚ 1  โ”‚ CRITICAL โ”‚ SQL Injection        โ”‚ CWE-89 โ”‚      โ”‚
โ”‚ 2  โ”‚ HIGH     โ”‚ Reflected XSS        โ”‚ CWE-79 โ”‚      โ”‚
โ”‚ 3  โ”‚ HIGH     โ”‚ Weak SSL Cipher      โ”‚ CWE-326โ”‚      โ”‚
โ”‚ ...โ”‚          โ”‚                      โ”‚        โ”‚      โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿ—๏ธ Project Structure

allowScanner/
โ”œโ”€โ”€ src/allowscanner/
โ”‚   โ”œโ”€โ”€ __init__.py          # Package exports
โ”‚   โ”œโ”€โ”€ cli.py               # CLI entry point
โ”‚   โ”œโ”€โ”€ scanner.py           # Main orchestrator
โ”‚   โ”œโ”€โ”€ output.py            # Rich terminal formatter
โ”‚   โ”œโ”€โ”€ core/
โ”‚   โ”‚   โ”œโ”€โ”€ models.py        # Data models (Vulnerability, ScanResult, etc.)
โ”‚   โ”‚   โ””โ”€โ”€ config.py        # Scan configuration
โ”‚   โ”œโ”€โ”€ scanners/
โ”‚   โ”‚   โ”œโ”€โ”€ http.py          # Async HTTP client
โ”‚   โ”‚   โ”œโ”€โ”€ vuln.py          # Vulnerability scanner
โ”‚   โ”‚   โ”œโ”€โ”€ ssl.py           # SSL/TLS auditor
โ”‚   โ”‚   โ”œโ”€โ”€ dns.py           # DNS security checker
โ”‚   โ”‚   โ”œโ”€โ”€ headers.py       # Security header analyzer
โ”‚   โ”‚   โ”œโ”€โ”€ tech.py          # Technology detector
โ”‚   โ”‚   โ”œโ”€โ”€ subdomain.py     # Subdomain enumerator
โ”‚   โ”‚   โ”œโ”€โ”€ cors.py          # CORS analyzer
โ”‚   โ”‚   โ””โ”€โ”€ cookies.py       # Cookie security checker
โ”‚   โ””โ”€โ”€ formatters/
โ”‚       โ””โ”€โ”€ __init__.py      # JSON formatter
โ”œโ”€โ”€ tests/
โ”‚   โ””โ”€โ”€ test_models.py
โ”œโ”€โ”€ pyproject.toml           # Project config
โ”œโ”€โ”€ Dockerfile               # Container support
โ”œโ”€โ”€ LICENSE                  # MIT License
โ””โ”€โ”€ README.md

๐Ÿ›ก๏ธ Security Checks

Vulnerability Detection

  • SQL Injection โ€” Error-based detection with multiple payloads
  • Cross-Site Scripting (XSS) โ€” Reflected XSS with DOM-based payloads
  • Server-Side Template Injection โ€” Jinja2, Twig, ERB, Freemarker
  • SSRF โ€” Internal metadata endpoints (AWS, GCP, Azure)
  • Command Injection โ€” OS command injection via shell metacharacters
  • XXE โ€” XML External Entity injection
  • Directory Traversal โ€” Path traversal with encoding bypass
  • Open Redirect โ€” Unvalidated redirect detection
  • Log4Shell โ€” CVE-2021-44228 detection

Infrastructure Security

  • SSL/TLS certificate health and expiry
  • Weak cipher suites and deprecated protocols
  • DNSSEC, SPF, DMARC, DKIM, CAA records
  • CORS misconfigurations
  • Cookie security attributes
  • Subdomain enumeration

โš ๏ธ Disclaimer

This tool is for authorized security testing only. Only scan targets you own or have explicit permission to test. Unauthorized scanning may violate laws and regulations. Always practice responsible disclosure.

๐Ÿ“ License

MIT ยฉ 2026 0xgetz

About

๐Ÿ” Web security scanner for smart contract allowances

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors