Vulnerability Scanner is a powerful Bash-based automation tool crafted for penetration testers and cybersecurity professionals. It combines intelligence gathering, brute-force testing, and exploit analysis into one streamlined command-line utility. Whether youβre conducting a basic recon or an in-depth assessment, this tool helps identify weak spots in a network environment effectively.
- π Automated Reconnaissance & Scanning
- π Brute-force login attacks with Hydra
- ποΈ Directory and file enumeration using Gobuster
- π§ WHOIS and ExploitDB Intelligence Gathering
- πΎ Structured output for each IP with auto-zipping for archives
- π Scan management: Start new scans or inspect previous results
Make sure the following tools are installed on your system:
nmap
hydra
gobuster
whois
searchsploit
(comes withexploitdb
)
/usr/share/seclists/Usernames/top-usernames-shortlist.txt
/usr/share/wordlists/metasploit/unix_passwords.txt
/usr/share/wordlists/rockyou.txt
sudo apt update
sudo apt install nmap hydra gobuster whois exploitdb
βββ vulnerability_scanner.sh # Main script
βββ DB/
β βββ [SCAN_RESULTS]/
β βββ [IP_REPORTS]/
β βββ full_scan_results.txt
β βββ exploit_analysis.txt
β βββ gobuster_report.txt
β βββ whois_report.txt
βββ .scan # Temporary scan state file
βββ .chk # Temporary check file
Make the script executable and run it:
chmod +x vulnerability_scanner.sh
./vulnerability_scanner.sh
[N] New Scan:
Choose between Basic or Full scan
Provide a valid IP range (e.g., 192.168.1.0/24)
Enter a directory name to store results
[I] Inspect Previous Results:
Enter the target IP address
Automatically zips and shows past results for sharing or review
-
Within each scan folder, youβll find:
-
full_scan_results.txt β nmap results
-
exploit_analysis.txt β Matches found via searchsploit
-
gobuster_report.txt β Directory enumeration output
-
whois_report.txt β WHOIS lookup information
-
[IP_REPORTS] β Directory with all target-specific logs and data
β This tool is intended only for authorized testing and educational use. Do not scan or test any network you do not own or have written permission to assess. Unauthorized use of this tool is illegal and unethical.
Srishti Rathi π‘οΈ Security Researcher | π΅οΈ Penetration Tester