PulseShield-Web-Application-Vulnerability-Scanner

๐Ÿ›ก๏ธ PulseShield โ€“ Web Vulnerability Scanner

A professional, AI-assisted web application vulnerability scanner built as an internship-ready security project. PulseShield helps security researchers and beginners identify common web vulnerabilities through an easy-to-use web dashboard, automated crawling, and PDF/JSON reporting.


๐Ÿš€ Key Highlights


๐Ÿ” Vulnerabilities Covered


๐Ÿง  Technology Stack


๐Ÿ“ Complete Project Structure

web-vulnerability-scanner/
โ”‚
โ”œโ”€โ”€ app.py
โ”œโ”€โ”€ requirements.txt
โ”œโ”€โ”€ README.md
โ”‚---config.py
โ”œโ”€โ”€ core/
โ”‚   โ”œโ”€โ”€ scanner.py
โ”‚   โ”œโ”€โ”€ crawler.py
โ”‚   โ”œโ”€โ”€ spa_crawler.py
โ”‚   โ”œโ”€โ”€ parameter_parser.py
โ”‚   โ”œโ”€โ”€ request_handler.py
โ”‚
โ”œโ”€โ”€ detectors/
โ”‚   โ”œโ”€โ”€ xss_detector.py
โ”‚   โ”œโ”€โ”€ sqli_detector.py
โ”‚   โ”œโ”€โ”€ ssrf_detector.py
โ”‚   โ”œโ”€โ”€ lfi_detector.py
โ”‚   โ”œโ”€โ”€ csrf_detector.py
โ”‚   โ”œโ”€โ”€ idor_detector.py
โ”‚   โ”œโ”€โ”€ auth_detector.py
โ”‚   โ”œโ”€โ”€ crypto_detector.py
โ”‚   โ”œโ”€โ”€ misconfig_detector.py
โ”‚   โ”œโ”€โ”€ component_detector.py
โ”‚   โ”œโ”€โ”€ logging_detector.py
โ”‚   โ”œโ”€โ”€ insecure_design_detector.py
โ”‚
โ”œโ”€โ”€ ai_engine/
โ”‚   โ”œโ”€โ”€ false_positive_killer.py
โ”‚   โ”œโ”€โ”€ severity_scoring.py
โ”‚   โ”œโ”€โ”€ payload_selector.py
โ”‚   โ”œโ”€โ”€ behavior_analysis.py
โ”‚
โ”œโ”€โ”€ utils/
โ”‚   โ”œโ”€โ”€ logger.py
โ”‚   โ”œโ”€โ”€ validators.py
โ”‚   โ”œโ”€โ”€ rate_limiter.py
โ”‚
โ”œโ”€โ”€ poc/
โ”‚   โ””โ”€โ”€ poc_screenshot.py
โ”‚
โ”œโ”€โ”€ payloads/
โ”‚   โ”œโ”€โ”€ xss.txt
โ”‚   โ”œโ”€โ”€ sqli.txt
โ”‚   โ”œโ”€โ”€ ssrf.txt
โ”‚   โ”œโ”€โ”€ lfi.txt
โ”‚
โ”œโ”€โ”€ reports/
โ”‚   โ”œโ”€โ”€ scan_report.pdf
โ”‚   โ”œโ”€โ”€ scan_results.json
โ”‚   โ””โ”€โ”€ screenshots/
โ”‚
โ”œโ”€โ”€ web/
โ”‚   โ”œโ”€โ”€ templates/
โ”‚   โ”‚   โ”œโ”€โ”€ base.html
โ”‚   โ”‚   โ”œโ”€โ”€ index.html
โ”‚   โ”‚   โ”œโ”€โ”€ login.html
โ”‚   โ”‚   โ”œโ”€โ”€ loading.html
โ”‚   โ”‚   โ””โ”€โ”€ dashboard.html
โ”‚   โ”‚
โ”‚   โ””โ”€โ”€ static/
โ”‚       โ”œโ”€โ”€ css/style.css
โ”‚       โ””โ”€โ”€ js/main.js/chart.js/login.js/loading.js
|
โ”‚
โ””โ”€โ”€ venv/

โš™๏ธ Installation & Setup (Windows โ€“ PowerShell)

1๏ธโƒฃ Clone the Repository

git clone https://github.com/nishajas291-crypto/PulseShield-Web-Application-Vulnerability-Scanner.git

2๏ธโƒฃ Enable Script Execution (PowerShell in vscode)

Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass

3๏ธโƒฃ Create & Activate Virtual Environment

python -m venv venv
venv\Scripts\activate

4๏ธโƒฃ Go to the folder path

 cd PulseShield-Web-Application-Vulnerability-Scanner

5๏ธโƒฃ Install Dependencies (Mandatory)


python -m pip install -r requirements.txt

IF throw error use below code


python -m pip install --upgrade pip
python -m pip install flask requests beautifulsoup4 lxml reportlab playwright
python -m playwright install


โ–ถ๏ธ Running the Application

python app.py

Open browser:

http://127.0.0.1:5000

๐Ÿ–ฅ๏ธ Web Interface Flow

  1. Login Page โ€“ Simple UI access
  2. Index Page โ€“ Enter target URL
  3. Loading Page โ€“ Live scan progress
  4. Dashboard โ€“

    • Severity statistics
    • Donut & OWASP charts
    • Findings table (clickable PoC URLs)
    • Report download buttons

## ๐Ÿ” Authentication (Login Feature)

This application includes a basic authentication system to restrict access to the scanning dashboard. Default Login Credentials

Username: admin
Password: admin123

๐Ÿ“„ Reports

๐Ÿ“˜ PDF Report

๐Ÿ“‘ JSON Report


๐Ÿ“ธ Screenshot PoC โ€“ Important Note


OWASP Top 10 Checklist

OWASP ID Category Covered in Project
A01 Broken Access Control โœ… IDOR Detector
A02 Cryptographic Failures โœ… Crypto Detector
A03 Injection โœ… SQLi, XSS
A04 Insecure Design โœ… Insecure Design Detector
A05 Security Misconfiguration โœ… Misconfig Detector
A06 Vulnerable Components โœ… Component Detector
A07 Auth Failures โœ… Auth Detector
A08 Software & Data Integrity โš ๏ธ Partial
A09 Logging & Monitoring โœ… Logging Detector
A10 SSRF โœ… SSRF Detector

๐Ÿ† Advantages of This Project


โš ๏ธ Limitations

โš ๏ธ Important Note (Lab / Restricted Systems)

This project uses Playwright (with greenlet dependency) exclusively for SPA (Single Page Application) crawling and screenshot capture.

On some institutional or corporate systems, Windows Application Control / AppLocker policies may block compiled dependencies such as greenlet, causing Playwright to fail during execution.

โœ… Workaround

If such a restriction is encountered:

This limitation is environmental, not a defect in the application logic.
All core vulnerability detection modules function correctly without SPA crawling.

This project uses Playwright for SPA crawling. On systems with Windows Application Control / AppLocker enabled, Playwright native dependencies (greenlet) may be blocked.

Recommended:


๐Ÿงช Intended Use

โš ๏ธ Scan only websites you own or have permission to test


๐Ÿ‘ค Author

Jasmine Nisha Cyber Security student India


๐Ÿ“œ License

This project is for educational and ethical research purposes only. Unauthorized scanning is strictly prohibited.

https://nishajas291-crypto.github.io/PulseShield-Web-Application-Vulnerability-Scanner/

Images

Home_page scan_progress_page findings_table report_ download auto_screenshots vuln_page

auto_screenshot_vuln_page owasp_severity_charts report_page