Skip to content

mennylevinski/passive_web_scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Passive Web Scanner

An interactive, cross-platform passive web vulnerability scanner designed to improve security posture through ethical diagnostics and training.


✔️ Lawful Use

This tool is intended solely for lawful and authorized use. You must obtain explicit permission from the network owner before scanning, auditing, or testing any systems. The author assumes no liability for misuse or for actions that violate applicable laws or organizational policies. Use responsibly and in compliance with your local governance.


🧬 Features

Checks performed (for the requested URL):

  • HTTP request & response metadata (status code, URL, final URL after redirects, content-type, server header)
  • Security headers and values (X-Content-Type-Options, X-Frame-Options, Content-Security-Policy)
  • Cookie analysis (parses Set-Cookie headers and looks for Secure, HttpOnly, SameSite)
  • Basic reflected XSS pattern search (detecting passive pattern matching only)
  • Simple injection-like pattern search in body (SQLi-like keywords), passive only
  • ASN provider and TLS certificate information for HTTPS targets: certificate subject, issuer, and validity.
  • Report includes a full checklist section describing each check and its result

🐍 Installation

1️ Requirements

  • Python 3.0+
  • Works on Windows, Linux
  • Install dependency:
    pip install requests
    

2️ Download & Run


Third-Party Attributions

This project uses the Requests library (© 2019 Kenneth Reitz)
Licensed under the Apache License 2.0
https://github.com/psf/requests

Releases

No releases published

Packages

 
 
 

Contributors

Languages