Skip to content

RAJ015HACKING/AegisX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

โš”๏ธ OWASP Military Grade Penetration Testing Framework

Python License Platform OWASP

Asynchronous | Modular | AI-Ready Security Scanner

Features โ€ข Installation โ€ข Usage โ€ข Scanners


๐Ÿ“‹ Overview

A Military Grade Python-based penetration testing framework targeting OWASP Top 10 (2021) vulnerabilities. Built with asynchronous architecture for 10x faster scanning compared to traditional tools.

โš ๏ธ Disclaimer: This tool is for authorized security testing only. Unauthorized use is illegal.


๐Ÿš€ Features

Feature Description
Async Warfare Engine aiohttp + asyncio based - 100+ concurrent connections
Stealth Mode Randomized User-Agents, Jitter delays, WAF bypass
Interactive TUI Rich interface with banners, panels, and tables
Modular Scanners Plug-and-play scanner modules
Heavy Payload Support External .txt payload files - unlimited ammo
Professional Reports HTML + JSON output for clients
IP Address Support Network reconnaissance + Web scanning

๐Ÿ“ฆ Installation

Prerequisites

  • Python 3.8 or higher
  • pip (Python package manager)

Quick Install

1. Clone the repository

git clone https://github.com/YOUR_USERNAME/owasp-scanner.git
cd owasp-scanner

2. Install dependencies

pip install -r requirements.txt

3. Create payload directories

mkdir -p payloads reports

4. Run the tool

python main.py

Linux Quick Setup (Optional)

Make executable

chmod +x main.py

Add alias (add to ~/.bashrc)

alias scan='python3 /path/to/owasp-scanner/main.py'

Now run from anywhere

scan

๐ŸŽฎ Usage

Interactive Mode (Recommended)

python main.py

Follow the on-screen menu:

  1. Enter target URL or IP address
  2. Select scanner module(s)
  3. View results in real-time
  4. Check reports/ folder for HTML/JSON reports

Command Line Arguments

Quick scan with specific module

python main.py --target https://example.com --scanner a03

Full scan (all modules)

python main.py --target 192.168.1.1 --all

Custom config

python main.py --target https://site.com --config config.yaml

๐Ÿ” Scanner Modules

Code Module OWASP Description
1 Access Control A01 Admin panels, hidden directories, backup files
2 IDOR Scanner A01 Insecure Direct Object Reference testing
3 Injection A03 SQL Injection, XSS, Command Injection
4 Misconfiguration A05 Server info, sensitive files, debug modes
5 Auth Failures A07 Weak passwords, session issues
6 SSRF A10 Server-Side Request Forgery

๐Ÿ“ File Structure

owasp-scanner/
โ”œโ”€โ”€ main.py                 # Entry point
โ”œโ”€โ”€ requirements.txt        # Dependencies
โ”œโ”€โ”€ config.yaml            # Configuration
โ”‚
โ”œโ”€โ”€ core/
โ”‚   โ”œโ”€โ”€ engine.py          # Async HTTP engine
โ”‚   โ”œโ”€โ”€ base_scanner.py    # Parent scanner class
โ”‚   โ”œโ”€โ”€ reporter.py        # Report generator
โ”‚   โ””โ”€โ”€ tui.py             # Terminal interface
โ”‚
โ”œโ”€โ”€ scanners/
โ”‚   โ”œโ”€โ”€ a00_port_scanner.py
โ”‚   โ”œโ”€โ”€ a01_access_control.py
โ”‚   โ”œโ”€โ”€ a01_idor.py
โ”‚   โ”œโ”€โ”€ a03_injection.py
โ”‚   โ”œโ”€โ”€ a05_misconfiguration.py
โ”‚   โ”œโ”€โ”€ a07_auth_failures.py
โ”‚   โ””โ”€โ”€ a10_ssrf.py
โ”‚
โ”œโ”€โ”€ payloads/              # Create this folder
โ”‚   โ”œโ”€โ”€ sqli.txt          # SQL Injection payloads
โ”‚   โ”œโ”€โ”€ xss.txt           # XSS payloads
โ”‚   โ”œโ”€โ”€ admin_paths.txt   # Admin panel paths
โ”‚   โ”œโ”€โ”€ backup_files.txt  # Sensitive files
โ”‚   โ”œโ”€โ”€ idor_params.txt   # IDOR parameters
โ”‚   โ”œโ”€โ”€ idor_values.txt   # IDOR test values
โ”‚   โ””โ”€โ”€ ssrf_urls.txt     # SSRF test URLs
โ”‚
โ””โ”€โ”€ reports/              # Auto-generated
    โ”œโ”€โ”€ report.html
    โ””โ”€โ”€ report.json

๐Ÿ“‹ Payload Files Setup

Create payloads/ folder and add these files:

Required Payload Files

File Purpose Min Lines
sqli.txt SQL Injection payloads 50+
xss.txt Cross-Site Scripting 50+
admin_paths.txt Admin panel paths 100+
backup_files.txt Sensitive/backup files 100+
ssrf_urls.txt SSRF test URLs 20+

Example Payloads

sqli.txt:

' OR 1=1--
' UNION SELECT 1,2,3--
' AND EXTRACTVALUE(1,CONCAT(0x7e,(SELECT DATABASE())))--

ssrf_urls.txt:

http://169.254.169.254/latest/meta-data/
http://metadata.google.internal/computeMetadata/v1/
http://localhost:22

โš™๏ธ Configuration

Edit config.yaml to customize:

# config.yaml
scanner:
  timeout: 10
  max_concurrent: 50
  user_agent: random
  jitter_min: 0.5
  jitter_max: 2.0

reports:
  output_dir: reports
  formats:
    - html
    - json

stealth:
  random_delay: true
  rotate_user_agent: true

๐Ÿ“Š Sample Output

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘         OWASP MILITARY GRADE PENETRATION FRAMEWORK           โ•‘
โ•‘                      Version 2024.3                          โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

[*] Target: https://example.com
[*] Scanner: A03 - Injection Scanner
[*] Payloads Loaded: 150

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ SCANNING PROGRESS                                            โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ 100% 150/150        โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ Severity โ”‚ HIGH - SQL Injection Detected                      โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ URL      โ”‚ https://example.com/product?id=1                   โ”‚
โ”‚ Payload  โ”‚ ' OR 1=1--                                         โ”‚
โ”‚ Evidence โ”‚ MySQL syntax error in response                     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

[โœ“] Scan Complete
[โœ“] Report saved: reports/report_2024-01-15.html

๐Ÿ”ง Troubleshooting

Common Issues

Problem Solution
ModuleNotFoundError Run pip install -r requirements.txt
Permission denied Use chmod +x main.py or run with sudo
Connection timeout Increase timeout in config.yaml
No payloads found Create files in payloads/ folder

๐Ÿ“œ Requirements

aiohttp>=3.8.0
rich>=13.0.0
pyyaml>=6.0
colorama>=0.4.6

Install all:

pip install aiohttp rich pyyaml colorama

๐Ÿค Contributing

  1. Fork the repository
  2. Create feature branch (git checkout -b feature/new-scanner)
  3. Commit changes (git commit -m 'Add new scanner')
  4. Push to branch (git push origin feature/new-scanner)
  5. Open Pull Request

๐Ÿ“œ License

This project is licensed under the MIT License - see LICENSE file.


โš ๏ธ Legal Disclaimer

This tool is provided for educational purposes and authorized security testing only.

  • Always obtain written permission before testing
  • Unauthorized access to computer systems is illegal
  • The authors assume no liability for misuse

Built with โค๏ธ for Security Researchers

โฌ† Back to Top

About

Military-grade asynchronous penetration testing framework targeting OWASP Top 10 vulnerabilities. Fast, modular, and AI-ready.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors