Skip to content

WebRecon is a tool that scans websites to find weaknesses and gather important information for cybersecurity purposes.

License

Notifications You must be signed in to change notification settings

niladri-1/VulnHawk

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

πŸ” VulnHawk - Advanced Web Reconnaissance Toolkit

Python Version License Security GitHub Stars GitHub Forks GitHub Issues GitHub Watchers Code Size Last Commit

Linux Bash Python Cybersecurity Penetration Testing OSINT Web Security Network Security

A comprehensive reconnaissance framework for ethical penetration testing and security research

Automate your OSINT gathering with 11+ integrated security tools


VulnHawk Interface

VulnHawk's colorful interface with interactive menu system


🎯 Overview

VulnHawk is a modular reconnaissance toolkit that streamlines the information gathering phase of penetration testing. Built for cybersecurity professionals, bug bounty hunters, and ethical hackers, it combines multiple industry-standard tools into a unified, easy-to-use interface.

✨ Key Highlights

  • πŸ”§ 11+ Integrated Tools - Nmap, Nikto, SQLMap, WPScan, and more
  • 🎨 Beautiful Interface - Color-coded output with clear progress indicators
  • πŸ“Š Automated Reporting - Timestamped logs and structured output
  • πŸš€ One-Click Scanning - Full reconnaissance suite with a single command
  • πŸ›‘οΈ Ethical Focus - Built-in safety warnings and responsible disclosure guidelines

πŸ› οΈ Installation

Prerequisites

  • Operating System: Kali Linux / Ubuntu / Debian
  • Python: 3.6 or higher
  • Privileges: Root access recommended for optimal tool functionality

Quick Setup

# Clone the repository
git clone https://github.com/niladri-1/VulnHawk.git
cd VulnHawk

# Make setup script executable and run
sudo chmod +x setup.sh && sudo ./setup.sh

# Install Python dependencies
sudo pip3 install -r requirements.txt

# Launch the tool
sudo python3 main.py

Manual Installation

Click to expand manual installation steps
# Update system packages
sudo apt update && sudo apt upgrade -y

# Install security tools
sudo apt install -y nmap whatweb dirb gobuster nikto sslscan \
                    wpscan sqlmap theharvester cewl curl dig \
                    whois openssl python3-pip

# Install Python requirements
pip3 install colorama requests beautifulsoup4 urllib3 certifi lxml

# Set permissions
chmod +x main.py

πŸš€ Quick Start

Basic Usage

# Launch VulnHawk
sudo python3 main.py

# Select target (e.g., example.com)
# Choose scan type from menu (1-11)
# View results in logs/ directory

Example Workflow

  1. 🎯 Set Target - Enter domain or IP address
  2. πŸ“‹ Choose Scan - Select from 0-11 reconnaissance modules
  3. ⏱️ Monitor Progress - Watch real-time colored output
  4. πŸ“„ Review Results - Check timestamped logs in logs/ folder

πŸ§ͺ Features & Modules

πŸ” Information Gathering

  • Technology Detection - Web stack fingerprinting
  • Port Scanning - Network service discovery
  • SSL/TLS Analysis - Certificate and cipher review
  • HTTP Headers - Security configuration audit
  • Source Code Analysis - Credential and secret hunting

🎯 Advanced Scanning

  • Directory Discovery - Hidden path enumeration
  • Vulnerability Assessment - Security flaw identification
  • WordPress Scanning - CMS-specific testing
  • SQL Injection Testing - Database security validation
  • Email Harvesting - Contact information gathering
  • Custom Wordlists - Target-specific dictionary generation

πŸ“Š Detailed Module Breakdown

Module Tool Used Purpose Timeout
πŸ”§ Technology Detection WhatWeb + Custom Identify web technologies, frameworks, CMS 60s
🌐 Port Scanning Nmap Discover open ports and services 300s
πŸ“ Directory Discovery Gobuster/Dirb Find hidden directories and files 300s
πŸ” Source Analysis Custom Scripts Extract secrets, credentials, comments 15s
πŸ”’ SSL/TLS Analysis SSLScan/OpenSSL Analyze certificate and encryption 120s
πŸ“‹ Header Analysis Custom Scripts Security headers assessment 10s
πŸ› Vulnerability Scan Nikto Web application vulnerability detection 600s
πŸ“ WordPress Scan WPScan WordPress-specific security testing 600s
πŸ’‰ SQL Injection SQLMap Database injection vulnerability testing 300s
πŸ“§ Email Harvesting theHarvester Contact information gathering 180s
πŸ“ Wordlist Generation CeWL Custom dictionary creation 180s

πŸ“ Project Structure

VulnHawk-tool/
β”œβ”€β”€ πŸ“„ main.py              # Main application interface
β”œβ”€β”€ πŸ”§ tools.py             # Reconnaissance module implementations
β”œβ”€β”€ πŸ› οΈ utils.py             # Utility functions and helpers
β”œβ”€β”€ βš™οΈ setup.sh             # Automated installation script
β”œβ”€β”€ πŸ“‹ requirements.txt      # Python package dependencies
β”œβ”€β”€ πŸ“– README.md            # Project documentation
└── πŸ“‚ logs/                # Auto-generated results directory
    β”œβ”€β”€ 🎯 target_scan_*.txt     # Individual scan results
    β”œβ”€β”€ πŸ” target_wordlist_*.txt # Generated wordlists
    └── πŸ“Š target_report_*.txt   # Comprehensive reports

πŸ’» Usage Examples

Single Module Execution

# Technology fingerprinting only
sudo python3 main.py
> Enter target: example.com
> Select option: 1

# Port scanning with service detection
sudo python3 main.py
> Enter target: 192.168.1.100
> Select option: 2

Full Reconnaissance Suite

# Complete automated scanning
sudo python3 main.py
> Enter target: target-domain.com
> Select option: 99  # Run all scans

πŸ“Š Sample Output

Technology Detection Results

═══════════════════════════════════════════════════════════════
TECHNOLOGY DETECTION (HTTPS) - SUCCESS
═══════════════════════════════════════════════════════════════

Target: example.com
Timestamp: 2024-12-30 14:30:22

Server: nginx/1.18.0
X-Powered-By: PHP/7.4.3
CMS: WordPress 6.1.1
Framework: Bootstrap 4.6.0
CDN: Cloudflare
SSL: TLS 1.3

βœ“ Output saved to: logs/example.com_technology_detection_20241230_143022.txt

Port Scan Results

═══════════════════════════════════════════════════════════════
PORT SCAN RESULTS - SUCCESS
═══════════════════════════════════════════════════════════════

22/tcp   open  ssh     OpenSSH 8.2p1
80/tcp   open  http    nginx 1.18.0
443/tcp  open  https   nginx 1.18.0
3306/tcp open  mysql   MySQL 8.0.25

βœ“ Output saved to: logs/example.com_port_scan_20241230_143125.txt

⚠️ Security & Legal Notice

πŸ”΄ IMPORTANT DISCLAIMER

This tool is for authorized testing only!

  • βœ… Authorized Use Only - Only scan systems you own or have explicit permission to test
  • 🚫 No Unauthorized Scanning - Unauthorized reconnaissance may violate laws in your jurisdiction
  • πŸ“œ Responsible Disclosure - Report vulnerabilities through proper channels
  • πŸ›‘οΈ Educational Purpose - Designed for learning and improving security

Best Practices

  1. πŸ“ Get Written Permission - Always obtain explicit authorization before scanning
  2. ⏰ Respect Rate Limits - Avoid overwhelming target systems
  3. πŸ”’ Secure Your Data - Protect collected information appropriately
  4. πŸ“Š Document Everything - Maintain detailed logs for compliance

🀝 Contributing

We welcome contributions! Here's how you can help:

Development Setup

# Fork and clone the repository
git clone https://github.com/niladri-1/VulnHawk.git
cd VulnHawk

# Create feature branch
git checkout -b feature/new-module

# Make changes and test
python3 main.py

# Submit pull request

Contribution Guidelines

  • πŸ› Bug Reports - Use GitHub issues with detailed descriptions
  • ✨ Feature Requests - Propose new modules or improvements
  • πŸ”§ Code Contributions - Follow Python PEP 8 style guidelines
  • πŸ“– Documentation - Help improve README and code comments

πŸ†˜ Troubleshooting

Common Issues

Permission Denied Errors
# Run with sudo privileges
sudo python3 main.py

# Check file permissions
chmod +x main.py setup.sh
Missing Tools
# Reinstall tools manually
sudo apt install nmap nikto sqlmap wpscan

# Check tool availability
which nmap
which nikto
Python Dependencies
# Reinstall requirements
pip3 install -r requirements.txt --force-reinstall

# Check Python version
python3 --version  # Should be 3.6+

Performance Optimization

  • πŸš€ SSD Storage - Use SSD for faster wordlist operations
  • 🌐 Network Speed - Ensure stable internet connection
  • πŸ’Ύ RAM Usage - Monitor memory during large scans
  • ⏱️ Timeouts - Adjust timeout values in utils.py if needed

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

Third-Party Tools

This toolkit integrates the following open-source security tools:

  • Nmap - Network discovery and security auditing
  • Nikto - Web server scanner
  • SQLMap - Automatic SQL injection tool
  • WPScan - WordPress security scanner
  • And more... - See setup.sh for complete list

πŸ“ž Support & Contact

Portfolio Email LinkedIn

Made with ❀️ by the cybersecurity community


⭐ Star this repository if you find it useful!

VulnHawk - Making reconnaissance accessible for everyone

About

WebRecon is a tool that scans websites to find weaknesses and gather important information for cybersecurity purposes.

Resources

License

Stars

Watchers

Forks