A safe, defensive vulnerability assessment toolkit written in Python. It performs:
- Port scanning (TCP)
- Lightweight banner grabbing for common services (HTTP, SSH, FTP, SMTP)
- Heuristic vulnerability assessment using a local rules database (
data/vuln_db.json) - HTML/JSON reporting saved in
reports/
Ethical Use Only: Use this tool only on systems you own or have explicit permission to test. No brute-force, exploit, or denial-of-service functionality is included.
python3 -m venv .venv
source .venv/bin/activate # Windows: .venv\Scripts\activate
pip install -r requirements.txt
python main.py --target 127.0.0.1 --ports 1-1024
# Or with a list:
python main.py --target 192.168.1.10 --ports 22,80,443,8080Reports are saved to reports/scan-<timestamp>.html and reports/scan-<timestamp>.json.
- TCP scan with timeouts and concurrency
- Service identification via simple port mapping and banner grabbing
- Local vulnerability rules (editable JSON). Add your own entries in
data/vuln_db.json - Zero external dependencies (standard library only)
- Add OS detection (TTL heuristics)
- Add TLS certificate info for 443
- Integrate optional Nmap XML parsing (if installed)
- Export to PDF using
wkhtmltopdf(optional)
This code is for authorized security testing and learning. Always obtain written consent before scanning networks.

