https://github.com/err0r-ica/scanter
Websites Vulnerability Scanner
https://github.com/err0r-ica/scanter
rce rce-exploit rce-scanner scanner server-side-template-injection sql-injection sql-scanner sqli ssti ssti-payloads xss xss-attacks xss-detection xss-exploitation xss-scanner xss-vulnerability
Last synced: 20 days ago
JSON representation
Websites Vulnerability Scanner
- Host: GitHub
- URL: https://github.com/err0r-ica/scanter
- Owner: Err0r-ICA
- License: gpl-3.0
- Created: 2020-04-27T15:12:38.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2024-10-13T13:20:38.000Z (7 months ago)
- Last Synced: 2025-04-09T18:18:32.638Z (20 days ago)
- Topics: rce, rce-exploit, rce-scanner, scanner, server-side-template-injection, sql-injection, sql-scanner, sqli, ssti, ssti-payloads, xss, xss-attacks, xss-detection, xss-exploitation, xss-scanner, xss-vulnerability
- Language: Python
- Homepage:
- Size: 99.6 KB
- Stars: 70
- Watchers: 1
- Forks: 14
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SCANter - Web Security Scanner ๐
## ๐ Description ๐
* ##### Detect This vulnerabilities
*Remote Code Execution
- Linux
*
XSS Reflected
*
Template Injection
- Jinja2
- ERB
- Java
- Twig
- Freemarker
*
SQl Injection
## ๐ธ Screenshot ๐ธ

## OS Support
-
Kali Linux
-
Android - Termux
-
Windows
## ๐ฟ Installation ๐ฟ
### [Linux](https://wikipedia.org/wiki/Linux) [](https://fr.wikipedia.org/wiki/Linux)
* open your terminal
* enter this command
````
$ git clone https://github.com/Err0r-ICA/SCANter
$ cd SCANter
$ python3 -m pip install -r requirements.txt
````
### Android
* Download Termux App
* open termux app
* enter this command
````bash
$ pkg install python -y
$ pkg install git -y
$ git clone https://github.com/Err0r-ICA/SCANter
$ cd SCANter
$ python3 -m pip install -r requirements.txt
````
### Windows
* Download python3 and install it
* open your cmd
* enter this command
````
$ python3 -m pip install -r requirements.txt
````
## ๐งพ Usage ๐งพ
````
Options:
-h, --help | Show help message and exit
--version | Show program's version number and exit
-u URL, --url=URL | Target URL (e.g."http://www.target.com/vuln.php?id=1")
--data=DATA | Data string to be sent through POST (e.g. "id=1")
--list=FILE | Get All Urls from List
--threads | Max number of concurrent HTTP(s) requests (default 10)
--timeout | Seconds to wait before timeout connection
--proxy | Start The Connection with http(s) proxy
--cookies | HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
--encode | How Many encode the payload (default 1)
--allow-redirect | Allow the main redirect
--verify | Skip HTTPS Cert Error
--user-agent | add custom user-agent
--scan-headers | Try to inject payloads in headers not parameters (user-agent,referrer)
--skip-headers | Skip The Headers scanning processe
--sleep | Sent one request after some Seconds
--batch | Never ask for user input, use the default behavior
--module | add custom module (e.g. "google.py")
````
### โ ๏ธ Input Example โ ๏ธ
``` $ python3 ICAscanner -u 'http://localhost/dvwa/vulnerabilities/exec/' --data='ip=localhost&Submit=Submit' --cookies='PHPSESSID=safasf' ```
[](https://github.com/Err0r-ICA/SpeedTest/issues) [](https://github.com/Err0r-ICA/SpeedTest/issues) [](https://github.com/Err0r-ICA/SpeedTest/issues)
[](https://github.com/Err0r-ICA/SpeedTest/issues) [](https://github.com/Err0r-ICA/SpeedTest/issues)
[](https://github.com/Err0r-ICA/SpeedTest/issues) [](https://github.com/Err0r-ICA/SpeedTest/issues)
[](https://github.com/Err0r-ICA/SpeedTest/issues)
### My Accounts