Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/anof-cyber/alphascan
A BurpSuite extension for vulnerability Scanning
https://github.com/anof-cyber/alphascan
application-security appsec bug-bounty bugbounty burp-extensions burpsuite pentesting security security-scanner vulnerability vulnerability-scanners
Last synced: about 2 months ago
JSON representation
A BurpSuite extension for vulnerability Scanning
- Host: GitHub
- URL: https://github.com/anof-cyber/alphascan
- Owner: Anof-cyber
- License: gpl-3.0
- Created: 2024-01-15T06:36:15.000Z (12 months ago)
- Default Branch: main
- Last Pushed: 2024-02-16T06:08:18.000Z (11 months ago)
- Last Synced: 2024-05-01T16:56:31.559Z (8 months ago)
- Topics: application-security, appsec, bug-bounty, bugbounty, burp-extensions, burpsuite, pentesting, security, security-scanner, vulnerability, vulnerability-scanners
- Language: Java
- Homepage:
- Size: 115 MB
- Stars: 23
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# AlphaScan
A BurpSuite extension for vulnerability Scanning[![Java Build](https://github.com/Anof-cyber/AlphaScan/actions/workflows/maven.yml/badge.svg)](https://github.com/Anof-cyber/AlphaScan/actions/workflows/maven.yml)
### 🚧 Under Development 🚧
This project is currently under active development. Not all features are implemented, and the code may not be stable. While contributions are appreciated, please note that I am not currently accepting external contributions.
## Vulnerabilities
###### Version 1.0
| Vulnerability | Details |
|--------------------------------|----------------------------------------------------------------------------------------------------------------------|
| Blind Time Based Injection | [Payloads](https://github.com/CyberM0nster/SQL-Injection-Payload-List-/blob/master/Generic%20Time%20Based%20SQL%20Injection%20Payloads) |
| AWS SSRF | [Payloads](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md#ssrf-url-for-cloud-instances) |
| Reflected XSS | [Payloads](https://github.com/Proviesec/xss-payload-list/tree/main) |
| Error Based SQL injection | [Payload-src-github](https://github.com/payloadbox/sql-injection-payload-list) ([Payload-src-twitter](https://x.com/Fabrikat0r/status/1731784913572200720?)) ([Payload-src-twitter](https://twitter.com/intigriti/status/1727669826338914506)) |
| Forced Browsing | Experimental, likely to be false positive|
| JSON CSRF| Check for Content type text and No Additional headers like bearer|
| JWT Token Expiry | |
| CORS| Check CORS if not check for Common Bypass |
| Verify session cookie or token | Not Part of Active or Passive Scan, Need to be validated before starting a scan through right click menu on any request with a valid session (Not expired) |
| Error Messages and Banner Grab| Passive Scanner for Error message or Server Banner|
| Missing CSP Header | |
| CSP Header with Insecure Directives | |
| CSP Header Missing Required Directives | |
| Missing X-Frame Header | |
| Missing HSTS Header | |
| Check If Request with Body support XML Content Type Header | Partial/ Could be False Positive, will be updated later |
| Session Identifier (HTTP Only Flag) | Only Available if Session Identifier is found |
| Session Identifier (Secure Flag) | Only Available if Session Identifier is found|