VulnReconX is a network vulnerability scanning tool that allows users to scan IP addresses or networks for open ports, services, and vulnerabilities. It provides detailed scan results, vulnerability information, recommendations for securing services, and support for notifications. This tool uses nmap
for network scanning and stores recommendations and vulnerabilities in a local SQLite
database.
- Scan IP addresses or entire networks
- Verbose mode for detailed scanning output
- OS detection and service version detection
- Color-coded vulnerability severity (High, Medium, Low)
- Integration with a local database for vulnerability recommendations and further investigation details
- Notifications on scan completion
- Save scan results to a file
- Python 3.x
- Dependencies:
nmap
(installed separately)psutil
(for network interface detection)plyer
(for desktop notifications)sqlite3
(included with Python)pywin32
(enables Windows-specific functionalities)
You can install the dependencies using pip
:
pip install psutil plyer pywin32
Ensure that nmap
is installed on your system. For installation instructions, refer to nmap official site.
- Clone this repository:
git clone /~https://github.com/Z3R0-D47/VulnReconX.git
cd VulnReconX
- Run the main.py or equivalent script to start the GUI:
python main.py
Ensure that nmap
is available in your system's PATH.
- Scan a Target: Enter an IP address or network in the input field and click "Scan Target IP".
- Scan Your Own IP: Click the "Scan Own IP" button to automatically scan your machine's IP address.
- Configure Scan Options: Choose additional scan options (verbose mode, OS detection, service version detection) through the "Configure Scan" button.
- Save Results: After the scan is complete, you can save the results to a file by clicking the "Save Results" button.
- Operating System Compatibility: The database is only compatible with Windows environments, limiting its use across diverse systems like Linux and macOS.
- Local Storage for Recommendations: The tool relies on local storage for storing vulnerability recommendations, which may affect efficiency and scalability when handling large datasets.
- Dependency on Nmap: The tool heavily relies on Nmap for vulnerability scanning, which may not detect vulnerabilities in specialized or custom systems that require more detailed, customized assessments.
- Fork the repository
- Create your feature branch
(git checkout -b feature-name)
- Commit your changes
(git commit -am 'Add feature')
- Push to the branch
(git push origin feature-name)
- Create a new Pull Request