RedVector is a terminal-based vulnerability scanner built in Python.
It focuses on identifying common web application vulnerabilities such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) using payloads and automated crawling.
- Detects SQL Injection vulnerabilities
- Detects XSS vulnerabilities
- Crawls target websites and extracts forms/links
- Uses external payload files for extensibility (
payloads/) - Stores scan history and results (
scan_history/scan_history.txt) - Simple, terminal-based interface
RedVector/
│
├── README.md # Project description
├── requirements.txt # Dependencies
├── redvector.py # Main CLI scanner
│
├── payloads/ # Attack payloads
│ ├── sqli_payloads.txt
│ └── xss_payloads.txt
│
├── scan_history/ # Scan logs/results
│ └── scan_history.txt
│
├── utils/ # Helper modules
│ ├── crawler.py
│ ├── scanners.py
│ └── logger.py
-
Clone the repository:
git clone https://github.com/your-username/RedVector.git cd RedVector -
Install dependencies:
pip install -r requirements.txt
Run the scanner:
python RedVector.pyOutput:
[+] Crawling target...
[+] Testing for SQL Injection...
[!] Potential vulnerability found at /login.php?id=1
See requirements.txt for Python package dependencies.
This tool is created for educational and ethical testing purposes only.
Do not use RedVector on systems you do not own or have permission to test.
The author is not responsible for any misuse.