Custom Web Exploit Toolkit is a Python-based CLI tool for automated web vulnerability testing.
It helps penetration testers quickly identify common security flaws with minimal manual intervention.
β For educational and authorized security testing purposes only.
Misuse of this tool is illegal.
- Modules:
- Reflected XSS (
xss) - CSRF (
csrf) - Clickjacking (
clickjacking) - SQL Injection (
sqli) β error, union, and time-based - HTML Injection (
htmli) - Open Redirect (
openredirect) - Directory Traversal (
traversal) β OS-aware payload optimization
- Reflected XSS (
- Injection Modes:
- URL parameter (
{{param}}placeholder) - Form-based (auto-discovery)
- Manual POST/GET injection (
--method,--data)
- URL parameter (
- Traversal Extras:
- Quick/Full scan modes
- OS detection
- Payload randomization
- Request throttling
- Auth Support:
--cookiefor session handling--headerfor custom HTTP headers
git clone https://github.com/shantanuv09/Web-Exploit-Toolkit.git
cd Web-Exploit-Toolkit
pip install -r requirements.txtRuns the XSS module by replacing {{param}} in the URL with payloads.
python main.py -u "http://target.com/page.php?input={{param}}" -m xssRuns both XSS and SQLi modules.
python main.py -u "http://target.com/page.php?input={{param}}" -m xss sqliSends payloads to parameters in POST data.
python main.py -u "http://target.com/form.php" \
-m sqli \
--method POST \
--data "username={{param}}&password=pass123"Performs full traversal scan with payload order randomized and request throttling enabled.
python main.py -u "http://target.com/file.php" \
-m traversal \
--method POST \
--data "file={{param}}&Submit=Submit" \
--mode full \
--throttle 0.2Web-Exploit-Toolkit/
β
βββ main.py
βββ core/
β βββ scanner.py
β βββ reporter.py
βββ modules/
β βββ csrf.py
β βββ clickjacking.py
β βββ xss.py
β βββ sqli.py
β βββ htmli.py
β βββ openredirect.py
β βββ traversal.py
βββ payloads/
β βββ xss/reflected.txt
β βββ sqli/
β βββ traversal/deep_traversal.txt
β βββ ...
βββ requirements.txtThis tool is intended for authorized penetration testing and educational purposes only. Unauthorized use against systems without permission is illegal and punishable under applicable laws.