Skip to content

Vulnerability Scanner is a Bash-based automated reconnaissance and vulnerability scanning tool designed for penetration testers and cybersecurity professionals. It allows users to perform fast and full-range network scans, brute-force attacks, and gather useful intelligence on discovered targets.

Notifications You must be signed in to change notification settings

SrishtiCode/Vulnerability-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

19 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” Vulnerability Scanner – Bash-Based Recon & Exploit Toolkit

Bash Cybersecurity Automated

πŸ’‘ Overview

Vulnerability Scanner is a powerful Bash-based automation tool crafted for penetration testers and cybersecurity professionals. It combines intelligence gathering, brute-force testing, and exploit analysis into one streamlined command-line utility. Whether you’re conducting a basic recon or an in-depth assessment, this tool helps identify weak spots in a network environment effectively.


πŸš€ Features

  • πŸ” Automated Reconnaissance & Scanning
  • πŸ” Brute-force login attacks with Hydra
  • πŸ—‚οΈ Directory and file enumeration using Gobuster
  • 🧠 WHOIS and ExploitDB Intelligence Gathering
  • πŸ’Ύ Structured output for each IP with auto-zipping for archives
  • πŸ“ Scan management: Start new scans or inspect previous results

πŸ“¦ Prerequisites

Make sure the following tools are installed on your system:

  • nmap
  • hydra
  • gobuster
  • whois
  • searchsploit (comes with exploitdb)

πŸ“„ Required Wordlists

  • /usr/share/seclists/Usernames/top-usernames-shortlist.txt
  • /usr/share/wordlists/metasploit/unix_passwords.txt
  • /usr/share/wordlists/rockyou.txt

πŸ› οΈ Install Dependencies (Debian/Ubuntu)

sudo apt update
sudo apt install nmap hydra gobuster whois exploitdb

πŸ“ Project Directory Structure

β”œβ”€β”€ vulnerability_scanner.sh             # Main script
β”œβ”€β”€ DB/
β”‚   └── [SCAN_RESULTS]/
β”‚       β”œβ”€β”€ [IP_REPORTS]/
β”‚       β”œβ”€β”€ full_scan_results.txt
β”‚       β”œβ”€β”€ exploit_analysis.txt
β”‚       β”œβ”€β”€ gobuster_report.txt
β”‚       β”œβ”€β”€ whois_report.txt
β”œβ”€β”€ .scan                                # Temporary scan state file
β”œβ”€β”€ .chk                                 # Temporary check file

βš™οΈ Usage

Make the script executable and run it:

chmod +x vulnerability_scanner.sh
./vulnerability_scanner.sh

πŸ”§ Options You'll Be Prompted With:

[N] New Scan:
Choose between Basic or Full scan

Provide a valid IP range (e.g., 192.168.1.0/24)

Enter a directory name to store results

[I] Inspect Previous Results:
Enter the target IP address

Automatically zips and shows past results for sharing or review

πŸ§ͺ Sample Output Files

  • Within each scan folder, you’ll find:

  • full_scan_results.txt – nmap results

  • exploit_analysis.txt – Matches found via searchsploit

  • gobuster_report.txt – Directory enumeration output

  • whois_report.txt – WHOIS lookup information

  • [IP_REPORTS] – Directory with all target-specific logs and data

⚠️ Legal Notice

❗ This tool is intended only for authorized testing and educational use. Do not scan or test any network you do not own or have written permission to assess. Unauthorized use of this tool is illegal and unethical.

πŸ‘©β€πŸ’» Author

Srishti Rathi πŸ›‘οΈ Security Researcher | πŸ•΅οΈ Penetration Tester

About

Vulnerability Scanner is a Bash-based automated reconnaissance and vulnerability scanning tool designed for penetration testers and cybersecurity professionals. It allows users to perform fast and full-range network scans, brute-force attacks, and gather useful intelligence on discovered targets.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages