This tool doesn't come with an --explain flag, a fancy GUI, or a built-in cybersecurity degree. Why?
Because if you need a tool to teach you what an XSS vulnerability is after you've already run a scanner on a live site, you're probably not ready to be scanning in the first place.
Don't get us wrong — everyone starts somewhere. But security isn't a game of "click and learn" — it's a responsibility. Automating the explanation of vulnerabilities makes it far too easy for someone to shift from "oops, I scanned myself" to "oops, I scanned someone else."
So no, this isn't a training tool.
It's a tool for trained people.
Wanna learn? Great!
Open the code, Google the terms, break your own lab. Just don't break the internet.
Love,
The Paranoid Dev 😎
- Light Version (scanner.py): A simple and fast security scan with basic features such as Directory Traversal, XSS, SQL Injection, and Port Scanning. Ideal for quick tests.
- Advanced Version (v2.py): Includes additional features like API security checks, directory brute-forcing, CSRF scanning, and much more. This version is optimized for more comprehensive security assessments and modern scenarios.
This tool includes the following features:
- 
Directory Traversal Check 
- 
XSS Vulnerability Check 
- 
SQL Injection Check 
- 
Port Scanning 
- 
HTTP Security Headers Check 
- 
SSL/TLS Configuration Check 
- 
Install required dependencies: 
pip install requests coloramaRun
python file.py  http://example.com
Run full assessment (including port scan and SSL check):
python file.py  https://example.com --full##########
- API Security Checks (--apiflag):
- Insecure HTTP methods detection
- Excessive data exposure testing
- Basic rate limiting checks
- Parameter manipulation tests
- Brute-force Detection (--bruteflag):
- Common directory/file enumeration
- Custom wordlist support
- Response code analysis
- Common config file detection
- CSRF Vulnerability Checking (--csrfflag):
- Missing CSRF token detection
- CORS misconfiguration checks
- SameSite cookie attribute verification
- Form action analysis
Usage Examples:
- Full AI API security audit:
python file.py https://ai-app.com/api --full --wordlist api_words.txt- Targeted checks:
python file.py https://ai-app.com/api --api --csrf- Custom directory brute-forcing:
python file.py https://ai-app.com --brute --wordlist custom_words.txtImportant Enhancements for AI Applications:
- API Security:
- Add JWT validation checks with python-joselibrary
- Implement OAuth token testing
- Add GraphQL introspection checks
- Brute-force Protection:
- Add rate-limiting detection
- Implement intelligent throttling
- Add common AI model path detection (e.g., /models,/inference)
- CSRF/CORS:
- Add pre-flight request testing
- Implement state-changing operation verification
- Add WebSocket CSRF checks
Required Dependencies:
pip install requests colorama beautifulsoup4Key Security Considerations for AI Apps:
- Model Protection:
- Add checks for unprotected model endpoints
- Test for training data leakage
- Verify model version access controls
- Data Sanitization:
- Implement input validation checks
- Add output encoding verification
- Test for prompt injection vulnerabilities
- API Authentication:
- Add JWT/cookie validation checks
- Test for missing authentication headers
- Verify scope-based access controls
This enhanced tool provides crucial checks for modern AI applications, focusing on API endpoints and web service security fundamentals. Always test in staging environments first and consider adding:
- Session management checks
- Webhook verification
- File upload validation
- Third-party dependency auditing
Remember to regularly update your wordlists and vulnerability patterns to keep pace with emerging AI-specific security challenges.
This repository contains tools for basic security checks of webservers. Unauthorized use of these tools is strictly prohibited. They are intended solely for educational purposes and for use in authorized environments.
By using these tools, you agree to take full responsibility for ensuring that your activities comply with applicable laws and regulations. Misusing these tools for malicious purposes may result in severe legal consequences.
Always obtain proper authorization before performing any security assessments.