A comprehensive reconnaissance framework for ethical penetration testing and security research
Automate your OSINT gathering with 11+ integrated security tools
VulnHawk's colorful interface with interactive menu system
VulnHawk is a modular reconnaissance toolkit that streamlines the information gathering phase of penetration testing. Built for cybersecurity professionals, bug bounty hunters, and ethical hackers, it combines multiple industry-standard tools into a unified, easy-to-use interface.
- π§ 11+ Integrated Tools - Nmap, Nikto, SQLMap, WPScan, and more
- π¨ Beautiful Interface - Color-coded output with clear progress indicators
- π Automated Reporting - Timestamped logs and structured output
- π One-Click Scanning - Full reconnaissance suite with a single command
- π‘οΈ Ethical Focus - Built-in safety warnings and responsible disclosure guidelines
- Operating System: Kali Linux / Ubuntu / Debian
- Python: 3.6 or higher
- Privileges: Root access recommended for optimal tool functionality
# Clone the repository
git clone https://github.com/niladri-1/VulnHawk.git
cd VulnHawk
# Make setup script executable and run
sudo chmod +x setup.sh && sudo ./setup.sh
# Install Python dependencies
sudo pip3 install -r requirements.txt
# Launch the tool
sudo python3 main.pyClick to expand manual installation steps
# Update system packages
sudo apt update && sudo apt upgrade -y
# Install security tools
sudo apt install -y nmap whatweb dirb gobuster nikto sslscan \
wpscan sqlmap theharvester cewl curl dig \
whois openssl python3-pip
# Install Python requirements
pip3 install colorama requests beautifulsoup4 urllib3 certifi lxml
# Set permissions
chmod +x main.py# Launch VulnHawk
sudo python3 main.py
# Select target (e.g., example.com)
# Choose scan type from menu (1-11)
# View results in logs/ directory- π― Set Target - Enter domain or IP address
- π Choose Scan - Select from 0-11 reconnaissance modules
- β±οΈ Monitor Progress - Watch real-time colored output
- π Review Results - Check timestamped logs in
logs/folder
|
|
| Module | Tool Used | Purpose | Timeout |
|---|---|---|---|
| π§ Technology Detection | WhatWeb + Custom | Identify web technologies, frameworks, CMS | 60s |
| π Port Scanning | Nmap | Discover open ports and services | 300s |
| π Directory Discovery | Gobuster/Dirb | Find hidden directories and files | 300s |
| π Source Analysis | Custom Scripts | Extract secrets, credentials, comments | 15s |
| π SSL/TLS Analysis | SSLScan/OpenSSL | Analyze certificate and encryption | 120s |
| π Header Analysis | Custom Scripts | Security headers assessment | 10s |
| π Vulnerability Scan | Nikto | Web application vulnerability detection | 600s |
| π WordPress Scan | WPScan | WordPress-specific security testing | 600s |
| π SQL Injection | SQLMap | Database injection vulnerability testing | 300s |
| π§ Email Harvesting | theHarvester | Contact information gathering | 180s |
| π Wordlist Generation | CeWL | Custom dictionary creation | 180s |
VulnHawk-tool/
βββ π main.py # Main application interface
βββ π§ tools.py # Reconnaissance module implementations
βββ π οΈ utils.py # Utility functions and helpers
βββ βοΈ setup.sh # Automated installation script
βββ π requirements.txt # Python package dependencies
βββ π README.md # Project documentation
βββ π logs/ # Auto-generated results directory
βββ π― target_scan_*.txt # Individual scan results
βββ π target_wordlist_*.txt # Generated wordlists
βββ π target_report_*.txt # Comprehensive reports
# Technology fingerprinting only
sudo python3 main.py
> Enter target: example.com
> Select option: 1
# Port scanning with service detection
sudo python3 main.py
> Enter target: 192.168.1.100
> Select option: 2# Complete automated scanning
sudo python3 main.py
> Enter target: target-domain.com
> Select option: 99 # Run all scansβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
TECHNOLOGY DETECTION (HTTPS) - SUCCESS
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Target: example.com
Timestamp: 2024-12-30 14:30:22
Server: nginx/1.18.0
X-Powered-By: PHP/7.4.3
CMS: WordPress 6.1.1
Framework: Bootstrap 4.6.0
CDN: Cloudflare
SSL: TLS 1.3
β Output saved to: logs/example.com_technology_detection_20241230_143022.txt
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
PORT SCAN RESULTS - SUCCESS
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
22/tcp open ssh OpenSSH 8.2p1
80/tcp open http nginx 1.18.0
443/tcp open https nginx 1.18.0
3306/tcp open mysql MySQL 8.0.25
β Output saved to: logs/example.com_port_scan_20241230_143125.txt
- β Authorized Use Only - Only scan systems you own or have explicit permission to test
- π« No Unauthorized Scanning - Unauthorized reconnaissance may violate laws in your jurisdiction
- π Responsible Disclosure - Report vulnerabilities through proper channels
- π‘οΈ Educational Purpose - Designed for learning and improving security
- π Get Written Permission - Always obtain explicit authorization before scanning
- β° Respect Rate Limits - Avoid overwhelming target systems
- π Secure Your Data - Protect collected information appropriately
- π Document Everything - Maintain detailed logs for compliance
We welcome contributions! Here's how you can help:
# Fork and clone the repository
git clone https://github.com/niladri-1/VulnHawk.git
cd VulnHawk
# Create feature branch
git checkout -b feature/new-module
# Make changes and test
python3 main.py
# Submit pull request- π Bug Reports - Use GitHub issues with detailed descriptions
- β¨ Feature Requests - Propose new modules or improvements
- π§ Code Contributions - Follow Python PEP 8 style guidelines
- π Documentation - Help improve README and code comments
Permission Denied Errors
# Run with sudo privileges
sudo python3 main.py
# Check file permissions
chmod +x main.py setup.shMissing Tools
# Reinstall tools manually
sudo apt install nmap nikto sqlmap wpscan
# Check tool availability
which nmap
which niktoPython Dependencies
# Reinstall requirements
pip3 install -r requirements.txt --force-reinstall
# Check Python version
python3 --version # Should be 3.6+- π SSD Storage - Use SSD for faster wordlist operations
- π Network Speed - Ensure stable internet connection
- πΎ RAM Usage - Monitor memory during large scans
- β±οΈ Timeouts - Adjust timeout values in
utils.pyif needed
This project is licensed under the MIT License - see the LICENSE file for details.
This toolkit integrates the following open-source security tools:
- Nmap - Network discovery and security auditing
- Nikto - Web server scanner
- SQLMap - Automatic SQL injection tool
- WPScan - WordPress security scanner
- And more... - See
setup.shfor complete list
β Star this repository if you find it useful!
VulnHawk - Making reconnaissance accessible for everyone