A Python based Web Application security scanner
Project description
Helios
Multi-threaded open-source web application security scanner
The current version can detect the following vulnerabilities:
SQL-Injections - Error Based - Boolean Based - Time Based
Cross-Site-Scripting - Reflected - Stored
File-inclusion - Local file inclusion - Remote file inclusion
File uploads - Command Injection - Backup-files - Error disclosure - Source code disclosure - Web application fingerprint and much more :)
How to install
git clone https://github.com/stefan2200/Helios.git cd Helios pip3 setup.py install or pip3 install Helios-Scanner helios-update-db helios -h
How to use (Command Line)
usage: helios: args [-h] [-u URL] [--urls URLS]
[--user-agent USER_AGENT] [-a] [-o OUTFILE]
[-d] [--driver-path DRIVER_PATH]
[--show-driver] [--interactive] [--no-proxy]
[--proxy-port PROXY_PORT] [-c]
[--max-urls MAXURLS] [--scopes SCOPES]
[--scope-options SCOPE_OPTIONS] [-s] [--adv]
[--cms] [--webapp] [--optimize]
[--options CUSTOM_OPTIONS]
[--login LOGIN_TYPE]
[--login-creds LOGIN_CREDS]
[--login-url LOGIN_URL]
[--login-data LOGIN_DATA]
[--token-url TOKEN_URL]
[--header LOGIN_HEADER] [--threads THREADS]
[--sslverify] [--database DB] [-v] [--msf]
[--msf-host MSF_HOST] [--msf-port MSF_PORT]
[--msf-creds MSF_CREDS]
[--msf-endpoint MSF_URI]
[--msf-nossl MSF_NOSSL] [--msf-start]
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL URL to start with
--urls URLS file with URL's to start with
--user-agent USER_AGENT
Set the user agent
-a, --all Run everything
-o OUTFILE, --output OUTFILE
Output file to write to (JSON)
Chromedriver Options:
-d, --driver Run WebDriver for advanced discovery
--driver-path DRIVER_PATH
Set custom path for the WebDriver
--show-driver Show the WebDriver window
--interactive Dont close the WebDriver window until keypress
--no-proxy Disable the proxy module for the WebDriver
--proxy-port PROXY_PORT
Set a custom port for the proxy module, default: 3333
Crawler Options:
-c, --crawler Enable the crawler
--max-urls MAXURLS Set max urls for the crawler
--scopes SCOPES Extra allowed scopes, comma separated hostnames (* can
be used as wildcard)
--scope-options SCOPE_OPTIONS
Various scope options (additional info in wiki)
--wordlist WL_FILE Additional web discovery wordlist
--wordlist-ext WL_EXT
Additional comma separated web discovery extensions
(requires wordlist)
--wordlist-404 WL_404
Custom 404 text pattern (default: use status code)
--wordlist-status-codes WL_CODES
Custom comma separated found status codes
Scanner Options:
-s, --scan Enable the scanner
--adv Enable the advanced scripts
--cms Enable the CMS module
--webapp Enable scanning of web application frameworks like
Tomcat / Jboss
--optimize Optimize the Scanner engine (uses more resources)
--options CUSTOM_OPTIONS
Comma separated list of scan options (discovery,
passive, injection, dangerous, all)
Login Options:
--login LOGIN_TYPE Set login method: basic, form, form-csrf, header
--login-creds LOGIN_CREDS
Basic Auth credentials username:password
--login-url LOGIN_URL
Set the URL to post to (forms)
--login-data LOGIN_DATA
Set urlencoded login data (forms)
--token-url TOKEN_URL
Get CSRF tokens from this page (default login-url)
--header LOGIN_HEADER
Set this header on all requests (OAuth tokens etc..)
example: "Key: Bearer {token}"
Advanced Options:
--threads THREADS Set a custom number of crawling / scanning threads
--sslverify Enable SSL verification (requests will fail without
proper cert)
--database DB The SQLite database to use
-v, --verbose Show verbose stuff
Metasploit Options:
--msf Enable the msfrpcd exploit module
--msf-host MSF_HOST Set the msfrpcd host
--msf-port MSF_PORT Set the msfrpcd port
--msf-creds MSF_CREDS
Set the msfrpcd username:password
--msf-endpoint MSF_URI
Set a custom endpoint URI
--msf-nossl MSF_NOSSL
Disable SSL
--msf-start Start msfrpcd if not running already
Crawl and scan an entire domain
helios.py -u "http://example.com/" -c -s
Safe scan
helios.py -u "http://example.com/" -c -s --options "passive,discovery" --adv
Full scan (with unsafe scripts)
helios.py -u "http://example.com/" -a --options all --max-urls 1000
Scan a single URL
helios.py -u "http://example.com/vuln.php?id=1" -s
Scan webapps and CMS systems
helios.py -u "http://example.com/blog/" --webapp --cms
Pwn a web server
helios.py -u "http://example.com/" --msf
Helios is built for authorized use only!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file Helios Scanner-1.1.tar.gz.
File metadata
- Download URL: Helios Scanner-1.1.tar.gz
- Upload date:
- Size: 50.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.4.0 requests-toolbelt/0.9.1 tqdm/4.36.1 CPython/3.7.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e027905f69c53a0419ba6c8ad0c356aca2cb534ebf7f15b47ba83aeffe79627d
|
|
| MD5 |
0b4e3bdf68f1850686021270ba575a38
|
|
| BLAKE2b-256 |
f8393e8b868e642d4aa34e2c663372d30da830f15e7bf00a9b3677f59df72ddd
|
File details
Details for the file Helios_Scanner-1.1-py3-none-any.whl.
File metadata
- Download URL: Helios_Scanner-1.1-py3-none-any.whl
- Upload date:
- Size: 3.7 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.4.0 requests-toolbelt/0.9.1 tqdm/4.36.1 CPython/3.7.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4ea0e78db52e9e0a0ec1c3d310d29a09231dffd8cb3b7034be794da0b9d8d6e7
|
|
| MD5 |
69e16c9201f2d17b8506a4fc344a6d01
|
|
| BLAKE2b-256 |
1daa48f75c6b3b4bd5ac7084ceac5bc2766b7056b59ac0e2daf1706b2c875a70
|