8-category vulnerability scanner that runs against your recon directory and produces organized, actionable findings.
Vuln Scanner is an open-source automated vulnerability scanner for bug bounty hunters. It takes a structured recon directory as input and runs 8 targeted checks — from XSS and SSRF to subdomain takeover and IDOR — using industry-standard tools like Nuclei, Dalfox, and Subjack. All findings are neatly organized by category for rapid triage.
# Category Tools Used 1 XSS dalfox, nuclei ( -tags xss)2 Subdomain Takeover subjack, nuclei ( -tags takeover)3 Misconfigurations nuclei (CORS, headers, misconfig templates) 4 Sensitive Data Exposure nuclei (exposed files, panels, default creds) + curl verification 5 SSRF nuclei ( -tags ssrf) + parameter flagging for manual testing6 Known CVEs nuclei ( -tags cve, medium+ severity)7 Open Redirects nuclei ( -tags redirect) + redirect parameter flagging8 IDOR / Auth Bypass Parameter grep, sequential ID detection, unauthenticated API probing, HTTP method tampering
git clone https://github.com/shuvonsec/vuln-scanner.git cd vuln-scanner chmod +x vuln_scanner.sh
# Full scan ./vuln_scanner.sh /path/to/recon/target # Quick mode (faster, reduced coverage) ./vuln_scanner.sh /path/to/recon/target --quick
The scanner expects a recon directory with the following layout:
recon/target/ live/urls.txt # Live URLs (required) live/httpx_full.txt # Alternative: httpx output urls/with_params.txt # URLs with query parameters urls/all.txt # All discovered URLs urls/api_endpoints.txt # API endpoints urls/sensitive_paths.txt # Sensitive file paths subdomains/all.txt # Subdomains list params/interesting_params.txt # Interesting parameters
Findings are saved to
findings/<target>/organized by vulnerability category:findings/target/ xss/ # XSS results takeover/ # Subdomain takeover results misconfig/ # CORS, headers, general misconfigs exposure/ # Exposed files, panels, default creds ssrf/ # SSRF findings + manual test candidates cves/ # Known CVE detections redirects/ # Open redirect findings idor/ # IDOR candidate URLs auth_bypass/ # Unauthenticated access, method tampering summary.txt # Consolidated summary of all findings
MIT — built for the bug bounty community.
shuvonsec/vuln-scanner
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|