Fast, async web security scanner for vulnerability detection, security header analysis, SSL/TLS auditing, DNS security checks, and more.
| Module | Description |
|---|---|
| ๐ Vulnerability Scanner | SQLi, XSS, SSRF, SSTI, Command Injection, XXE, Open Redirect, Directory Traversal |
| ๐ก๏ธ Security Headers | CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy |
| ๐ SSL/TLS Audit | Certificate validation, expiry checks, weak ciphers, protocol version |
| ๐ DNS Security | DNSSEC, SPF, DMARC, DKIM, CAA records |
| ๐ ๏ธ Technology Detection | 30+ frameworks/servers: WordPress, React, Laravel, Nginx, Cloudflare, etc. |
| ๐ Subdomain Enum | DNS-based subdomain discovery (500+ common prefixes) |
| ๐ช Cookie Security | Secure, HttpOnly, SameSite attribute checks |
| ๐ CORS Analysis | Wildcard, reflected origin, null origin, credentials misconfiguration |
| ๐ Sensitive Files | .env, .git, phpinfo.php, Spring Actuator, Swagger, etc. |
| ๐ Admin Panels | Discover exposed admin/login interfaces |
| ๐ Security Score | 0โ100 score based on findings |
git clone https://github.com/0xgetz/allowScanner.git
cd allowScanner
pip install -e .# Basic scan
allowscanner https://example.com
# JSON output
allowscanner https://example.com -o report.json -f json
# High concurrency
allowscanner https://example.com -c 100
# Only specific modules
allowscanner https://example.com --only ssl,dns,headers
# Skip subdomain enumeration
allowscanner https://example.com --no-subdomainsdocker build -t allowscanner .
docker run --rm allowscanner https://example.comallowscanner [OPTIONS] URL
Positional:
url Target URL to scan
Options:
-o, --output FILE Save report to file
-f, --format FORMAT Output format: terminal | json | markdown
-c, --concurrency N Max concurrent requests (default: 50)
-t, --timeout N Request timeout in seconds (default: 15)
-v, --verbose Verbose output
--no-color Disable colored output
Module toggles:
--no-ssl Skip SSL/TLS checks
--no-dns Skip DNS security checks
--no-headers Skip security header checks
--no-vulns Skip vulnerability scans
--no-admin Skip admin panel discovery
--no-sensitive Skip sensitive file checks
--no-tech Skip technology detection
--no-subdomains Skip subdomain enumeration
--no-cors Skip CORS checks
--no-cookies Skip cookie security checks
--only MODULES Only run specific modules (comma-separated)
Modules: ssl,dns,headers,vulns,tech,subdomains,cors,cookies,admin,sensitive
โญโโโโ ๐ Scan Summary โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฎ
โ Target: https://example.com โ
โ Domain: example.com โ
โ Duration: 4.2s โ
โ Score: 72/100 โ
โฐโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
โญโโโโ โ ๏ธ Vulnerability Summary โโโโโโโโโโโโโโโโโโโโโโโโโฎ
โ Critical: 1 High: 2 Medium: 4 Low: 3 โ
โฐโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
โโโโ ๐ Detailed Findings โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ # โ Severity โ Finding โ CWE โ โ
โโโโโโผโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโ โ
โ 1 โ CRITICAL โ SQL Injection โ CWE-89 โ โ
โ 2 โ HIGH โ Reflected XSS โ CWE-79 โ โ
โ 3 โ HIGH โ Weak SSL Cipher โ CWE-326โ โ
โ ...โ โ โ โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
allowScanner/
โโโ src/allowscanner/
โ โโโ __init__.py # Package exports
โ โโโ cli.py # CLI entry point
โ โโโ scanner.py # Main orchestrator
โ โโโ output.py # Rich terminal formatter
โ โโโ core/
โ โ โโโ models.py # Data models (Vulnerability, ScanResult, etc.)
โ โ โโโ config.py # Scan configuration
โ โโโ scanners/
โ โ โโโ http.py # Async HTTP client
โ โ โโโ vuln.py # Vulnerability scanner
โ โ โโโ ssl.py # SSL/TLS auditor
โ โ โโโ dns.py # DNS security checker
โ โ โโโ headers.py # Security header analyzer
โ โ โโโ tech.py # Technology detector
โ โ โโโ subdomain.py # Subdomain enumerator
โ โ โโโ cors.py # CORS analyzer
โ โ โโโ cookies.py # Cookie security checker
โ โโโ formatters/
โ โโโ __init__.py # JSON formatter
โโโ tests/
โ โโโ test_models.py
โโโ pyproject.toml # Project config
โโโ Dockerfile # Container support
โโโ LICENSE # MIT License
โโโ README.md
- SQL Injection โ Error-based detection with multiple payloads
- Cross-Site Scripting (XSS) โ Reflected XSS with DOM-based payloads
- Server-Side Template Injection โ Jinja2, Twig, ERB, Freemarker
- SSRF โ Internal metadata endpoints (AWS, GCP, Azure)
- Command Injection โ OS command injection via shell metacharacters
- XXE โ XML External Entity injection
- Directory Traversal โ Path traversal with encoding bypass
- Open Redirect โ Unvalidated redirect detection
- Log4Shell โ CVE-2021-44228 detection
- SSL/TLS certificate health and expiry
- Weak cipher suites and deprecated protocols
- DNSSEC, SPF, DMARC, DKIM, CAA records
- CORS misconfigurations
- Cookie security attributes
- Subdomain enumeration
This tool is for authorized security testing only. Only scan targets you own or have explicit permission to test. Unauthorized scanning may violate laws and regulations. Always practice responsible disclosure.
MIT ยฉ 2026 0xgetz