Web Vulnerability Scanner
Automated multi-vector vulnerability scanner built for bug bounty hunters and pentesters. Detects SQLi, XSS, RCE, SSRF, LFI, SSTI, XXE, JWT flaws, open redirects, IDOR, and more.
Capabilities
Multi-vector scanning with intelligent payload validation to minimize false positives.
Installation
Requires Python 3.8+. Install dependencies and run.
$ git clone https://github.com/zenithx/zelinscan
$ cd zelinscan
$ pip install -r requirements.txt
$ python zelinscan.py -u http://testphp.vulnweb.com/listproducts.php?cat=1
Reference
Full list of flags and options.
| Flag | Default | Description |
|---|---|---|
| -u, --url | required | Target URL |
| -p, --params | โ | Custom parameters (e.g. -p id page q) |
| -t, --threads | 50 | Number of concurrent threads |
| --timeout | 5 | Request timeout in seconds |
| -o, --output | auto | Output JSON file path |
| --proxy | โ | HTTP proxy (e.g. http://127.0.0.1:8080) |
| --depth | 2 | Crawl depth for param discovery |
| --no-crawl | off | Disable auto parameter crawling |
| --rate-limit | 0 | Delay between requests (seconds) |
| -v, --verbose | off | Show every request/response detail |
| --all | off | Enable ALL extra scan modules |
| -d, --dir | payloads/ | Custom payload directory |
Examples
Copy-paste ready commands for common scenarios.
$ python zelinscan.py -u "https://target.com/page.php?id=1"
$ python zelinscan.py -u "https://target.com" --all -v -o output.json
$ python zelinscan.py -u "https://target.com/search?q=test" --proxy http://127.0.0.1:8080
Reference