Skip to content

Latest commit

 

History

History
42 lines (30 loc) · 1.31 KB

README.md

File metadata and controls

42 lines (30 loc) · 1.31 KB

Tool 2: Web Application Exploitation Framework

The Web Application Exploitation Framework is a powerful tool for identifying and exploiting vulnerabilities in web applications. It supports various attack vectors such as SQL injection, cross-site scripting (XSS), and remote code execution (RCE).

Features

SQL Injection Scanner: Detect and exploit SQL injection vulnerabilities.
XSS Scanner: Identify and exploit cross-site scripting vulnerabilities.
RCE Exploitation: Execute remote commands on vulnerable web applications.
Payload Generator: Generate payloads for various exploitation techniques.
Reporting: Generate detailed reports of discovered vulnerabilities and exploits.

Usage bash

Clone the repository

git clone (https://github.com/hak193/WEB-EXPLOIT-FRAMEWORK) cd web-exploit-framework

Install dependencies

pip install -r requirements.txt

Run the tool

python exploit.py --url https://target-website.com

Example Output Code

Scanning URL: https://target-website.com Vulnerabilities found:

  • SQL Injection: /product?id=1
  • XSS: /search?q=<script>alert('XSS')</script>

Exploiting SQL Injection:

  • Database: MySQL
  • Extracted data: Username: admin, Password: password123

Exploiting XSS:

  • Payload: <script>alert('XSS')</script>

Report generated: report.html

1 vulnerability detected