Skip to content

hak193/WEB-EXPLOIT-FRAMEWORK

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Tool 2: Web Application Exploitation Framework

The Web Application Exploitation Framework is a powerful tool for identifying and exploiting vulnerabilities in web applications. It supports various attack vectors such as SQL injection, cross-site scripting (XSS), and remote code execution (RCE).

Features

SQL Injection Scanner: Detect and exploit SQL injection vulnerabilities.
XSS Scanner: Identify and exploit cross-site scripting vulnerabilities.
RCE Exploitation: Execute remote commands on vulnerable web applications.
Payload Generator: Generate payloads for various exploitation techniques.
Reporting: Generate detailed reports of discovered vulnerabilities and exploits.

Usage bash

Clone the repository

git clone (https://github.com/hak193/WEB-EXPLOIT-FRAMEWORK) cd web-exploit-framework

Install dependencies

pip install -r requirements.txt

Run the tool

python exploit.py --url https://target-website.com

Example Output Code

Scanning URL: https://target-website.com Vulnerabilities found:

  • SQL Injection: /product?id=1
  • XSS: /search?q=<script>alert('XSS')</script>

Exploiting SQL Injection:

  • Database: MySQL
  • Extracted data: Username: admin, Password: password123

Exploiting XSS:

  • Payload: <script>alert('XSS')</script>

Report generated: report.html

1 vulnerability detected

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published