The Web Application Exploitation Framework is a powerful tool for identifying and exploiting vulnerabilities in web applications. It supports various attack vectors such as SQL injection, cross-site scripting (XSS), and remote code execution (RCE).
Features
SQL Injection Scanner: Detect and exploit SQL injection vulnerabilities.
XSS Scanner: Identify and exploit cross-site scripting vulnerabilities.
RCE Exploitation: Execute remote commands on vulnerable web applications.
Payload Generator: Generate payloads for various exploitation techniques.
Reporting: Generate detailed reports of discovered vulnerabilities and exploits.
Usage bash
git clone (https://github.com/hak193/WEB-EXPLOIT-FRAMEWORK) cd web-exploit-framework
pip install -r requirements.txt
python exploit.py --url https://target-website.com
Example Output Code
Scanning URL: https://target-website.com Vulnerabilities found:
- SQL Injection: /product?id=1
- XSS: /search?q=<script>alert('XSS')</script>
Exploiting SQL Injection:
- Database: MySQL
- Extracted data: Username: admin, Password: password123
Exploiting XSS:
- Payload: <script>alert('XSS')</script>
Report generated: report.html
1 vulnerability detected