├── r00t.sh ├── start.py ├── README.md └── Scanner-web.py /r00t.sh: -------------------------------------------------------------------------------- 1 | mno=$(whoami) 2 | if [ $mno == root ] 3 | then 4 | python3 Scanner-web.py 5 | else 6 | sudo python3 Scanner-web.py 7 | fi 8 | -------------------------------------------------------------------------------- /start.py: -------------------------------------------------------------------------------- 1 | import os 2 | try: 3 | import requests 4 | except ModuleNotFoundError: 5 | os.system('pip install requests') 6 | os.system('clear') 7 | try: 8 | import time 9 | except ModuleNotFoundError: 10 | os.system('pip install time') 11 | os.system('clear') 12 | try: 13 | import socket 14 | except ModuleNotFoundError: 15 | os.system('pip install socket') 16 | os.system('clear') 17 | os.system('bash r00t.sh') 18 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Scanner-web 2 | 3 | Tool function: 4 | - 5 | - Extract links from the website 6 | - Information about the domain and website 7 | - Check out website ports 8 | -------------------- 9 | install in kali linux : 10 | 11 | ``` 12 | git clone https://github.com/vv1ck/Scanner-web.git 13 | ``` 14 | 15 | 16 | 17 | ``` 18 | cd Scanner-web 19 | ``` 20 | 21 | 22 | 23 | ``` 24 | python3 start.py 25 | ``` 26 | 27 | 28 | 29 | -------------------- 30 | By JOKER | Snapchat 👻 | telegram 🔷 31 | - 32 | see 33 | -------------------------------------------------------------------------------- /Scanner-web.py: -------------------------------------------------------------------------------- 1 | import requests,socket,re 2 | print(""" 3 | _____ By J0KER @vv1ck 4 | / ___/_________ _____ ____ ___ _____ 5 | \__ \/ ___/ __ `/ __ \/ __ \/ _ \/ ___/ 6 | ___/ / /__/ /_/ / / / / / / / __/ / Web 7 | /____/\___/\__,_/_/ /_/_/ /_/\___/_/ 8 | 9 | 1- Website links 10 | 2- website information 11 | 3- Check out website ports 12 | 99- Exit ...""") 13 | JR = input('\n[?] Enter the tool number: ') 14 | sn_ip = input('[?] Enter the website link: ') 15 | r=requests.session() 16 | try:webIP = sn_ip.split('.')[1] 17 | except IndexError: 18 | print('[-] Please enter a valid link');print('[-] Example: www.instagram.com');input('');exit() 19 | try: 20 | IPhost = socket.gethostbyname(sn_ip) 21 | except socket.gaierror: 22 | if JR=='1':pass 23 | else:print('[!] The domain name is incorrect, please check it');input('');exit() 24 | print('\n') 25 | def PORT_Scanner(): 26 | print('\n[%] scanner has been started ..') 27 | for port in range(1,65325): 28 | server = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 29 | server.settimeout(0.1) 30 | QTR = server.connect_ex((IPhost,port)) 31 | if QTR ==0: 32 | print('\n[+] open port \n \t-> IP: '+str(IPhost)+' | PORT: '+str(port)) 33 | print(' I have not finished yet') 34 | if port == 500: 35 | yes = input('\n[?] Want to continue the examination? [ y / n ] ') 36 | if yes == 'y': 37 | print("\n[!] being checked ..") 38 | else: 39 | input('Enter to exit') 40 | exit() 41 | elif port == 1000: 42 | yes = input('\n[?] Want to continue the examination? [ y / n ] ') 43 | if yes == 'y': 44 | print("\n[!] being checked ..") 45 | else: 46 | input('Enter to exit') 47 | exit() 48 | elif port == 2000: 49 | yes = input('\n[?] Want to continue the examination? [ y / n ] ') 50 | if yes == 'y': 51 | print("\n[!] being checked ..") 52 | else: 53 | input('Enter to exit') 54 | exit() 55 | else: 56 | pass 57 | else: 58 | if port == 3000: 59 | yes = input('\n[?] Want to continue the examination? [ y / n ] ') 60 | if yes == 'y': 61 | print("\n[!] being checked ..") 62 | else: 63 | input('Enter to exit') 64 | exit() 65 | elif port == 5000: 66 | yes = input('\n[?] Want to continue the examination? [ y / n ] ') 67 | if yes == 'y': 68 | print("\n[!] being checked ..") 69 | else: 70 | input('Enter to exit') 71 | exit() 72 | else: 73 | pass 74 | def page_links(): 75 | print(r.get(f'https://api.hackertarget.com/pagelinks/?q={webIP}.com').text) 76 | def WEB_Scanner(): 77 | headers ={ 78 | 'Host': f'{webIP}.com.w3snoop.com', 79 | 'User-Agent': 'Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0', 80 | 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8', 81 | 'Accept-Language': 'en-US,en;q=0.5', 82 | 'Accept-Encoding': 'gzip, deflate', 83 | 'Upgrade-Insecure-Requests': '1', 84 | 'Sec-Fetch-Dest': 'document', 85 | 'Sec-Fetch-Mode': 'navigate', 86 | 'Sec-Fetch-Site': 'none', 87 | 'Sec-Fetch-User': '?1', 88 | 'Cache-Control': 'max-age=0', 89 | 'Te': 'trailers', 90 | 'Connection': 'close'} 91 | send = r.get(f'https://{webIP}.com.w3snoop.com/',headers=headers).text 92 | Server_IP =re.findall('class=text-primary>Server IP Address: