diff --git a/x0-automation-script/scanning-tools/SmokeDVS/README.md b/x0-automation-script/scanning-tools/SmokeDVS/README.md new file mode 100644 index 0000000..bac8936 --- /dev/null +++ b/x0-automation-script/scanning-tools/SmokeDVS/README.md @@ -0,0 +1,55 @@ +# Domain Vulnerability Scanner v2.25 + +## Overview + +The Domain Vulnerability Scanner is a portable Python-based tool designed to identify potential common security vulnerabilities in a given domain. + +## Features + +- **Port Scanning**: Checks for open ports and identifies associated services. +- **DNS Enumeration**: Detects common subdomains for the provided domain. +- **Directory Traversal**: Checks for directory traversal vulnerabilities. +- **SSL Certificate Validation**: Verifies the presence and validity of SSL certificates. +- **HTTP Header Analysis**: Checks for security-related HTTP headers. +- **Cross-Site Scripting (XSS)**: Tests for potential XSS vulnerabilities. +- **Cross-Site Request Forgery (CSRF)**: Checks for CSRF protection mechanisms. +- **SQL Injection**: Tests for basic SQL injection vulnerabilities. + +## Requirements + +- Python 3.x +- Standard Python libraries (`os`, `platform`, `datetime`, `http.client`, `re`, `socket`, `ssl`, `urllib.parse`, `base64`) + +## Installation + +1. Clone the repository: + ```bash + git clone https://github.com/smokeshard/100-days-of-cybersecurity/ + cd 100-days-of-cybersecurity/x0-automation-script/scanning-tools/SmokeDVS + ``` + +2. Run the scanner: + ```bash + python SmokeDVS.py + ``` + +## Usage + +1. Run the script and enter the domain you wish to scan when prompted. +2. The scanner will perform various security checks and log the results to a file. + +## Contributing + +Contributions are welcome! Please open an issue or submit a pull request. + +## License + +This project is licensed under the MIT License. See the __LICENSE__ file for details. + +## Disclaimer + +This tool is intended for educational purposes and authorized security testing only. Unauthorized use of this tool may violate laws and regulations. The author is not responsible for any misuse or damage caused by this tool. + +## Contact + +For any questions or feedback, please contact the author on Discord: @smokeshard diff --git a/PHASE-2/smokeshard-webvulnscanner.py b/x0-automation-script/scanning-tools/SmokeDVS/SmokeDVS.py similarity index 94% rename from PHASE-2/smokeshard-webvulnscanner.py rename to x0-automation-script/scanning-tools/SmokeDVS/SmokeDVS.py index 1576cce..da933e1 100644 --- a/PHASE-2/smokeshard-webvulnscanner.py +++ b/x0-automation-script/scanning-tools/SmokeDVS/SmokeDVS.py @@ -1,4 +1,4 @@ -# Domain Vulnerability Scanner v2.25 +# Domain Vulnerability Scanner v2.3 # Author: @smokeshard on Discord # ====================================================================================================================== @@ -23,14 +23,15 @@ def __init__ (self, domain): os.system("cls") print("=====\n") print(" __ __ __ __ __ __ ") - print("/\ \_ /\ \ /'__`\ /\ \_ /\ \ /\ \ ") - print("\/'__`\ ___ ___ ___\ \ \/'\ /\_\L\ \ \/'__`\ \ \___ __ _ __ \_\ \ ") - print("/\ \_\_\ /' __` __`\ / __`\ \ , < \/_/_\_<_/\ \_\_\ \ _ `\ /'__`\ /\`'__\/'_` \ ") - print("\ \____ \/\ \/\ \/\ \/\ \L\ \ \ \\\\`\ /\ \L\ \ \____ \ \ \ \ \/\ \L\.\_\ \ \//\ \L\ \\") - print(" \/\ \_\ \ \_\ \_\ \_\ \____/\ \_\ \_\ \____/\/\ \_\ \ \_\ \_\ \__/.\_\\\\ \_\\\\ \___,_\\") - print(" \ `\_ _/\/_/\/_/\/_/\/___/ \/_/\/_/\/___/ \ `\_ _/\/_/\/_/\/__/\/_/ \/_/ \/__,_ /") - print(" `\_/\_\ `\_/\_\ ") - print(" \/_/ \/_/ ") + print("/\\ \\_ /\\ \\ /'__`\\ /\\ \\_ /\\ \\ /\\ \\ ") + print("\\/'__`\\ ___ ___ ___\\ \\ \\/'\\ /\\_\\L\\ \\ \\/'__`\\ \\ \\___ __ _ __ \\_\\ \\ ") + print("/\\ \\_\\_\\ /' __` __`\\ / __`\\ \\ , < \\/_/_\\_<_/\\ \\_\\_\\ \\ _ `\\ /'__`\\ /\\`'__\\/'_` \\ ") + print("\\ \\____ \\/\\ \\/\\ \\/\\ \\/\\ \\L\\ \\ \\ \\\\`\\ /\\ \\L\\ \\ \\____ \\ \\ \\ \\ \\/\\ \\L\\.\\_\\ \\ \\//\\ \\L\\ \\") + print(" \\/\\ \\_\\ \\ \\_\\ \\_\\ \\_\\ \\____/\\ \\_\\ \\_\\ \\____/\\/\\ \\_\\ \\ \\_\\ \\_\\ \\__/.\\_\\\\ \\_\\\\ \\___,_\\") + print(" \\ `\\_ _/\\/_/\\/_/\\/_/\\/___/ \\/_/\\/_/\\/___/ \\ `\\_ _/\\/_/\\/_/\\/__/\\/_/ \\/_/ \\/__,_ /") + print(" `\\_/\\_\\ `\\_/\\_\\ ") + print(" \\/_/ \\/_/ ") + print("Domain Vulnerability Scanner v2.3") print("\n") domain = re.sub(r'https?://|:[0-9]+', '', domain.lower()).split('/')[0] self.domain = domain