A professional, AI-assisted web application vulnerability scanner built as an internship-ready security project. PulseShield helps security researchers and beginners identify common web vulnerabilities through an easy-to-use web dashboard, automated crawling, and PDF/JSON reporting.
web-vulnerability-scanner/
โ
โโโ app.py
โโโ requirements.txt
โโโ README.md
โ---config.py
โโโ core/
โ โโโ scanner.py
โ โโโ crawler.py
โ โโโ spa_crawler.py
โ โโโ parameter_parser.py
โ โโโ request_handler.py
โ
โโโ detectors/
โ โโโ xss_detector.py
โ โโโ sqli_detector.py
โ โโโ ssrf_detector.py
โ โโโ lfi_detector.py
โ โโโ csrf_detector.py
โ โโโ idor_detector.py
โ โโโ auth_detector.py
โ โโโ crypto_detector.py
โ โโโ misconfig_detector.py
โ โโโ component_detector.py
โ โโโ logging_detector.py
โ โโโ insecure_design_detector.py
โ
โโโ ai_engine/
โ โโโ false_positive_killer.py
โ โโโ severity_scoring.py
โ โโโ payload_selector.py
โ โโโ behavior_analysis.py
โ
โโโ utils/
โ โโโ logger.py
โ โโโ validators.py
โ โโโ rate_limiter.py
โ
โโโ poc/
โ โโโ poc_screenshot.py
โ
โโโ payloads/
โ โโโ xss.txt
โ โโโ sqli.txt
โ โโโ ssrf.txt
โ โโโ lfi.txt
โ
โโโ reports/
โ โโโ scan_report.pdf
โ โโโ scan_results.json
โ โโโ screenshots/
โ
โโโ web/
โ โโโ templates/
โ โ โโโ base.html
โ โ โโโ index.html
โ โ โโโ login.html
โ โ โโโ loading.html
โ โ โโโ dashboard.html
โ โ
โ โโโ static/
โ โโโ css/style.css
โ โโโ js/main.js/chart.js/login.js/loading.js
|
โ
โโโ venv/
git clone https://github.com/nishajas291-crypto/PulseShield-Web-Application-Vulnerability-Scanner.git
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
python -m venv venv
venv\Scripts\activate
cd PulseShield-Web-Application-Vulnerability-Scanner
python -m pip install -r requirements.txt
IF throw error use below code
python -m pip install --upgrade pip
python -m pip install flask requests beautifulsoup4 lxml reportlab playwright
python -m playwright install
python app.py
Open browser:
http://127.0.0.1:5000
Dashboard โ
## ๐ Authentication (Login Feature)
This application includes a basic authentication system to restrict access to the scanning dashboard. Default Login Credentials
Username: admin
Password: admin123
Automatically captured for:
SSRF screenshots may fail
| OWASP ID | Category | Covered in Project |
|---|---|---|
| A01 | Broken Access Control | โ IDOR Detector |
| A02 | Cryptographic Failures | โ Crypto Detector |
| A03 | Injection | โ SQLi, XSS |
| A04 | Insecure Design | โ Insecure Design Detector |
| A05 | Security Misconfiguration | โ Misconfig Detector |
| A06 | Vulnerable Components | โ Component Detector |
| A07 | Auth Failures | โ Auth Detector |
| A08 | Software & Data Integrity | โ ๏ธ Partial |
| A09 | Logging & Monitoring | โ Logging Detector |
| A10 | SSRF | โ SSRF Detector |
This project uses Playwright (with greenlet dependency) exclusively for SPA (Single Page Application) crawling and screenshot capture.
On some institutional or corporate systems, Windows Application Control / AppLocker policies may block compiled dependencies such as greenlet, causing Playwright to fail during execution.
If such a restriction is encountered:
This limitation is environmental, not a defect in the application logic.
All core vulnerability detection modules function correctly without SPA crawling.
This project uses Playwright for SPA crawling. On systems with Windows Application Control / AppLocker enabled, Playwright native dependencies (greenlet) may be blocked.
Recommended:
โ ๏ธ Scan only websites you own or have permission to test
Jasmine Nisha Cyber Security student India
This project is for educational and ethical research purposes only. Unauthorized scanning is strictly prohibited.
https://nishajas291-crypto.github.io/PulseShield-Web-Application-Vulnerability-Scanner/