Automated Vulnerability Scanner — Multi-tool CLI/GUI Pen-Test Suite
Overview#
Automated Vulnerability Scanner is a multifunctional penetration-testing and scanning toolkit with both CLI and GUI (Tkinter) interfaces. Built for red teams, security researchers, trainers, and students, it can run from USB (portable mode) or be deployed on Kali/Parrot. Designed as a training and field-ops tool with automation and reporting features.
Key Features#
- Network Scanning
- Nmap-based full port & service scans (
-sV) with advanced options. - Auto-save and post-scan analysis of results.
- Nmap-based full port & service scans (
- Vulnerability Assessment
- Local CVE matching and lookup (CVE ID, severity, description).
- References to Exploit-DB / NVD.
- Extendable DB for custom mappings.
- Web Application Testing
- SQL Injection, XSS, directory listing checks.
- Uses tools like
sqlmap,whatweb,nikto. - Saves test reports to a dedicated folder.
- Exploitation Module
- Direct Metasploit integration.
- Select exploit, auto-deploy, and link to Meterpreter sessions.
- Session Manager
- List active Meterpreter sessions, run commands, upload/download files, pull credentials.
- Password Attacks
- Target SSH, FTP, HTTP Basic Auth using
hydra+ wordlists. - Support for custom input interfaces (wordlists, rules).
- Target SSH, FTP, HTTP Basic Auth using
- Wireless Audit
airodump-ngdiscovery and handshake capture.- WPA/WPA2 cracking with
aircrack-ng.
- Automated PDF Reporting
- Compiles findings into a formatted PDF (target, vuln details, screenshots).
- Saved under
results/reports.
- Utility Tools
- Ping sweep, Whois, DNS lookup, traceroute.
- Webhook Notifications
- Auto-send reports to Discord/Slack via webhook.
- Shodan Integration
- Pull public footprint data (OS, open ports, geo) for target enrichment.
- MITM Proxy Integration
- mitmproxy support to intercept traffic; save logs/HAR for later analysis.
Target Audience#
- Red teams & penetration testers
- Pen-test firms
- Cybersecurity trainers & labs
- Security awareness teams
- Students and training courses
Ethical & Legal Notice (Important)#
Use only on authorized networks or in controlled lab environments. Unauthorized scanning, exploitation, or disruption of third-party systems is illegal and unethical. Follow Shariah and local laws — obtain explicit written permission before testing.



