https://github.com/rezasp/vbscan
OWASP VBScan is a Black Box vBulletin Vulnerability Scanner
https://github.com/rezasp/vbscan
exploit owasp vbscan vbulletin vulnerability vulnerability-scanners
Last synced: 6 months ago
JSON representation
OWASP VBScan is a Black Box vBulletin Vulnerability Scanner
- Host: GitHub
- URL: https://github.com/rezasp/vbscan
- Owner: OWASP
- License: gpl-3.0
- Created: 2015-06-09T06:05:26.000Z (about 10 years ago)
- Default Branch: master
- Last Pushed: 2019-06-16T17:01:59.000Z (about 6 years ago)
- Last Synced: 2024-12-24T22:02:40.216Z (6 months ago)
- Topics: exploit, owasp, vbscan, vbulletin, vulnerability, vulnerability-scanners
- Language: Perl
- Homepage: https://www.owasp.org/index.php/OWASP_VBScan_Project
- Size: 97.7 KB
- Stars: 326
- Watchers: 35
- Forks: 119
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
Awesome Lists containing this project
README

[](https://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/)

[](https://github.com/rezasp/vbscan/blob/master/COPYING.GPL)
[](http://www.twitter.com/owasp_vbscan)
[](http://www.twitter.com/rezesp)
![]()
OWASP VBScan
======OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analysis them .
### Why OWASP VBScan ?
If you want to do a penetration test on a vBulletin Forum, OWASP VBScan is Your best shot ever!
This Project is being faster than ever and updated with the latest VBulletin vulnerabilities.* Project Leader : [Mohammad Reza Espargham] (reza[dot]espargham[at]owasp[dot]org)
* Github : https://github.com/rezasp/vbscan/
* SourceForge : https://sourceforge.net/projects/vbscan/
* OWASP Page : https://www.owasp.org/index.php/OWASP_VBScan_Project
usage :
------
```
./vbscan.pl
./vbscan.pl http://target.com/vbulletin
```
![]()
OWASP VBScan 0.1.7 introduction (Youtube)[](https://www.youtube.com/watch?v=SirozqDYERA)
OWASP VBScan Teaser (Youtube)
[](https://www.youtube.com/watch?v=NGEtJoGL2yA)