
Web vulnerability scanner for OWASP top 10
Why Choose This Project?
In today’s world of web applications, vulnerabilities such as SQL Injection, XSS, CSRF, and insecure deserialization are widespread. This project provides a practical tool to scan and detect the most critical web vulnerabilities as defined by the OWASP Top 10. It simulates a professional security scanner used by ethical hackers, penetration testers, and security analysts.
What You Get in the Project?
-
Full-featured web vulnerability scanner dashboard
-
Crawls websites and detects OWASP Top 10 risks
-
Customizable scan targets, scan depth, and result filters
-
Intuitive user interface with real-time results display
-
Complete frontend and backend source code
-
Export scan results to PDF or CSV
-
Clean UI with responsive design
-
Includes documentation and setup guide
Technology Stack Used
Layer | Technology Used |
---|---|
Frontend | HTML5, CSS3, Bootstrap 5, JavaScript |
Backend | Node.js (Express.js) / Python (Flask) / Java (Spring Boot) |
Vulnerability Engine | Python (custom scanner) or OWASP ZAP API |
Database | MongoDB or MySQL |
Reports | jsPDF / HTML to CSV |
OWASP Top 10 Vulnerabilities Covered
-
Injection (SQL, Command)
-
Broken Authentication
-
Sensitive Data Exposure
-
XML External Entities (XXE)
-
Broken Access Control
-
Security Misconfiguration
-
Cross-Site Scripting (XSS)
-
Insecure Deserialization
-
Using Components with Known Vulnerabilities
-
Insufficient Logging & Monitoring
Key Features
-
URL Target Input – User enters the target domain or page
-
Crawling Engine – Crawls internal links for testing
-
Injection Tester – Runs payloads to detect SQLi, XSS, etc.
-
Response Analyzer – Checks headers, responses, and inputs
-
Visual Alerts – Colored indicators (High/Medium/Low risk)
-
Report Generator – Export test reports to PDF/CSV
-
Authentication Token Input – Scan secured apps via JWT/session
-
Lightweight UI – Real-time logs and background scanning
-
Email Alerts (Optional) – Send results to admin email