Skip to main content

A tool to check for file inclusion vulnerabilities.

Project description

Inclusion Scanner

Overview

The Inclusion Scanner is a Python tool designed to detect file inclusion vulnerabilities on web applications. By leveraging various payloads, the scanner attempts to access sensitive files and configurations that should not be publicly exposed. This tool can be helpful for security professionals and developers seeking to identify potential security flaws in their applications.

Features

  • Supports Multiple Payloads: Uses a predefined list of payloads to check for vulnerabilities.
  • Custom Payloads: Users can specify their own payload files for tailored scans.
  • Real-Time Feedback: The scanner can provide immediate feedback on vulnerabilities found during the scan.

Installation

Ensure you have Python installed on your system. Then, install the required libraries using pip:

pip install inclusion

Usage

Command Line Interface

You can run the scanner from the command line using various options:

  1. Basic Usage with a URL

This command will scan the specified URL using default payloads:

inclusion --url https://example.com/
  1. Using a Custom Payload File

To scan using a custom payload file, specify the path to your file:

inclusion --url https://example.com/ --payload path/to/custom_payloads.txt

Python Code Examples

  1. Basic Usage with Default Payloads

This example demonstrates how to use the scanner in a Python script with default payloads:

from inclusion import scan

url = "https://example.com/"

def print_vulnerability(test_url):
    print(f"Inclusion vulnerability found: {test_url}")

vulnerabilities = scan(url, callback=print_vulnerability)

if not vulnerabilities:
    print("No vulnerabilities found.")
  1. Using a Custom Payload File

Here’s how to scan a URL using a custom payload file:

from inclusion import scan

url = "https://example.com/"
payload_file = "path/to/custom_payloads.txt"

def print_vulnerability(test_url):
    print(f"Inclusion vulnerability found: {test_url}")

vulnerabilities = scan(url, payload_file=payload_file, callback=print_vulnerability)

if not vulnerabilities:
    print("No vulnerabilities found.")

How It Works

The scanner constructs URLs by appending payloads to the base URL. It then sends HTTP requests to the constructed URLs and checks the responses for signs of file inclusion vulnerabilities, such as the presence of sensitive data.

Important Notes

  • Use Responsibly: Always obtain permission before scanning a web application. Unauthorized scanning may violate terms of service or laws.
  • Environment: Ensure that your scanning environment is safe and secure, especially if you are testing against live applications.

License

This project is licensed under the MIT License.

Contribution

Contributions are welcome! If you have suggestions or improvements, feel free to open an issue or submit a pull request.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

inclusion-1.0.2.tar.gz (5.8 kB view details)

Uploaded Source

Built Distribution

inclusion-1.0.2-py3-none-any.whl (6.4 kB view details)

Uploaded Python 3

File details

Details for the file inclusion-1.0.2.tar.gz.

File metadata

  • Download URL: inclusion-1.0.2.tar.gz
  • Upload date:
  • Size: 5.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.11.2

File hashes

Hashes for inclusion-1.0.2.tar.gz
Algorithm Hash digest
SHA256 00db21180c1aaa82b40e79a180c26a2d64e3c692fa577ff1984a0e6fc29f2dd1
MD5 5c3a9e182f4059b386e9afd5438f2e1a
BLAKE2b-256 2f83d021342f9e26c7964f412debf9d67277f8713186e16815dfa32c12070ad5

See more details on using hashes here.

File details

Details for the file inclusion-1.0.2-py3-none-any.whl.

File metadata

  • Download URL: inclusion-1.0.2-py3-none-any.whl
  • Upload date:
  • Size: 6.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.11.2

File hashes

Hashes for inclusion-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 f350223f21ab1713a5d7de89d25ea964ffc652f7f58d8b0cfe6a2414ac8145ff
MD5 3c10f6abfc6dc73f02b3d8fcddd53023
BLAKE2b-256 ad0c9f9c45de144e7a9fbde23b37eb7f6ae4f75102e1010f7e5517c48780697e

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page