AcademicVulnerabilityScanne is an automated, extensible Python-based scanner designed for researchers running WSL Kali Linux. It streamlines environment setup, payload sourcing, and vulnerability detection across academic domains (e.g. .ac.ir), integrating real-time reporting and Google-based reconnaissance.
β οΈ This tool is intended strictly for authorized testing. Scanning systems without documented permission may violate laws and ethics.
| β Feature | π Description |
|---|---|
| π§ Environment Setup | Installs seclists, Python 3, dependencies, and configures WSL networking |
| π¦ Payload Management | Loads test vectors from SecLists, with fallbacks to hardcoded payloads |
| π΅οΈββοΈ Vulnerability Scan | Identifies Open Redirect, XSS, SQLi, Command Injection, LFI, and RFI |
| π£ Heavy Exploitation | Optional deep payloads to expose sensitive data via SQLi, LFI, and RFI |
| π― Email Extraction | Detects .ac.ir email addresses in response and markup |
| π Google API Integration | Uses Custom Search API for live target discovery |
| π Reporting | Color-coded terminal output and JSON summary at ~/project/scan_results.json |
| π§ͺ WSL Compatibility | Handles DNS, permission, and OS-specific behavior |
- π» OS: WSL (Windows Subsystem for Linux) with Kali
- π Python: β₯ 3.8
- π¦ System Tools:
python3,python3-pip,curl,seclists - π Python Libraries:
requests,beautifulsoup4,python-dotenv,tqdm - π Google API Credentials (optional)
# Clone or create script
nano vuln_scan.py # Paste script contents
chmod +x vuln_scan.py
# Run
python3 vuln_scan.py