Skip to content

Akashcp111/Automated-Web-Exploitation-Bot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔥 Automated Web Exploitation Bot (Offensive Cybersecurity + AI)

A powerful offensive cybersecurity tool that automates the discovery and exploitation of common web application vulnerabilities like XSS, SQL Injection, and Remote Code Execution using smart fuzzing and payload automation.

🔥 Overview:

The Automated Web Exploitation Bot is an AI-assisted offensive security tool designed to automate the process of scanning, detecting, and exploiting common web vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution (RCE).

It mimics a red-team adversary by crawling the target web application, identifying input points, injecting smart payloads, and reporting discovered flaws — all autonomously.

🎯 Key Features

  • 🔍 AI-Powered Crawler: Crawls through target web apps and detects all input forms
  • 🧠 Smart Fuzzer: Uses NLP-enhanced payload generation for form fuzzing
  • 🛠️ Auto Exploitation Engine: Injects custom payloads into detected fields and analyzes responses
  • 📄 HTML Report Generator: Auto-generates detailed vulnerability reports
  • 📊 Streamlit Dashboard: Visual dashboard for vulnerability stats, filterable reports, and CSV export
  • 🧪 Safe Local Testing: Works with local vulnerable apps like DVWA for safe security testing

🧰 Tools & Technologies

  • Python 3.11
  • Requests & BeautifulSoup - Web crawling and form parsing
  • Selenium (Optional) - For JS-heavy sites
  • OWASP ZAP API / SQLMap - For vulnerability detection (extendable)
  • Streamlit - Dashboard frontend
  • JSON/HTML - Vulnerability reporting format

📦 Folder Structure

web-exploit-bot/
├── main.py                     # Entry point: starts crawler, fuzzer, report gen, dashboard
├── requirements.txt            # Python dependencies
├── README.md                   # Project overview and instructions
│
├── scanner/
│   ├── crawler.py              # Crawls web pages and extracts forms/links
│   ├── fuzzer.py               # Fuzzes inputs using custom/ML payloads
│   ├── exploit_engine.py       # Injects and verifies payload impact
│   ├── reporter.py             # Generates vulnerability reports
│   ├── dashboard.py            # Streamlit dashboard for visualization
│   └── vuln_log.json           # JSON log of vulnerabilities (generated dynamically)
│
├── payloads/
│   └── payloads.json           # Custom payload list (XSS, SQLi, RCE, etc.)
│
└── reports/
    └── report.html             # Generated HTML report of scan results

🚀 How to Run

  1. Clone the repo:
    git clone https://github.com/yourusername/web-exploit-bot.git
    cd web-exploit-bot
    
  2. Install dependencies:
    pip install -r requirements.txt
    
    
  3. Run the tool:
    python main.py
    
    

⚠️ Disclaimer

  • This tool is built strictly for educational and ethical research purposes.
  • Do NOT scan or exploit websites without explicit permission. Always follow responsible disclosure practices.

👨‍💻 Authors

  • Akash CP – Final Year BCA Cybersecurity Student
  • Guided by mentors for academic research & SOC tools

About

A powerful offensive cybersecurity tool that automates the discovery and exploitation of common web application vulnerabilities like XSS, SQL Injection, and Remote Code Execution using smart fuzzing and payload automation.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages