Web Vulnerability Scanner

ZelinScan
Find Before
They Do.

Automated multi-vector vulnerability scanner built for bug bounty hunters and pentesters. Detects SQLi, XSS, RCE, SSRF, LFI, SSTI, XXE, JWT flaws, open redirects, IDOR, and more.

Get Started โ†’ View Docs
8+
Vuln Types
50
Threads
WAF
Detection
[!] DISCLAIMER: ZelinScan is intended for educational purposes and authorized security testing only. Only use this tool on systems you own or have explicit written permission to test. Unauthorized use against systems you don't own is illegal and unethical. The developer is not responsible for any misuse.

Capabilities

What it detects

Multi-vector scanning with intelligent payload validation to minimize false positives.

๐Ÿ’‰
SQL Injection
Error-based, time-based blind, and UNION-based detection. Covers MySQL, PostgreSQL, MSSQL, Oracle, SQLite.
Critical
๐Ÿ”ฅ
Remote Code Execution
Detects command injection via output indicators and time-based sleep payloads. Checks for uid/gid leakage.
Critical
๐Ÿงช
Server-Side Template Injection
Math expression evaluation (7*7=49), Jinja2/Twig/Freemarker/Velocity payload detection.
Critical
๐ŸŒ
Cross-Site Scripting
Reflected XSS via parameter injection. Checks for unescaped script tags, event handlers, and javascript: URIs.
Medium
๐Ÿ“
Local File Inclusion
Path traversal detection including /etc/passwd leakage, Windows system file exposure, and base64-encoded output.
High
๐Ÿ”
SSRF
Server-Side Request Forgery against cloud metadata endpoints (AWS/GCP/Azure) and internal services.
High
๐Ÿ“ฆ
XXE Injection
XML External Entity attacks including file read, error-based, and blind OOB detection patterns.
High
๐Ÿ”‘
JWT Vulnerabilities
Algorithm confusion (none/HS256), weak secret brute-force indicators, and signature bypass detection.
High
โ†ช๏ธ
Open Redirect
Tests redirect params (url, next, goto, return) with 8+ bypass payloads including protocol-relative and encoded URLs.
Medium
๐Ÿ”“
IDOR Detection
Increments numeric ID parameters and compares response diffs to detect insecure direct object references.
High
๐Ÿ“จ
Header Injection
Tests 12 HTTP headers (X-Forwarded-For, X-Host, Referer, etc.) with XSS and SQLi payloads.
Medium
๐Ÿ›ก๏ธ
WAF Detection
Identifies Cloudflare, ModSecurity, Akamai, Imperva, AWS WAF, Sucuri, Barracuda, Fortinet, and more.
Recon

Installation

Get ZelinScan

Requires Python 3.8+. Install dependencies and run.

Clone & Install
$ git clone https://github.com/zenithx/zelinscan $ cd zelinscan $ pip install -r requirements.txt
Quick Test
$ python zelinscan.py -u http://testphp.vulnweb.com/listproducts.php?cat=1

Reference

CLI Arguments

Full list of flags and options.

Arguments
FlagDefaultDescription
-u, --urlrequiredTarget URL
-p, --paramsโ€”Custom parameters (e.g. -p id page q)
-t, --threads50Number of concurrent threads
--timeout5Request timeout in seconds
-o, --outputautoOutput JSON file path
--proxyโ€”HTTP proxy (e.g. http://127.0.0.1:8080)
--depth2Crawl depth for param discovery
--no-crawloffDisable auto parameter crawling
--rate-limit0Delay between requests (seconds)
-v, --verboseoffShow every request/response detail
--alloffEnable ALL extra scan modules
-d, --dirpayloads/Custom payload directory

Examples

Common Usage

Copy-paste ready commands for common scenarios.

Basic scan
$ python zelinscan.py -u "https://target.com/page.php?id=1"
Full scan โ€” all modules + verbose
$ python zelinscan.py -u "https://target.com" --all -v -o output.json
Scan through Burp Suite proxy
$ python zelinscan.py -u "https://target.com/search?q=test" --proxy http://127.0.0.1:8080
zelinscan โ€” scan output
[*] Target : http://testphp.vulnweb.com/listproducts.php?cat=1 ------------------------------------------------------- [+] Found 1 params in URL [Critical] SQLi | http://testphp.vulnweb.com/listproducts.php?cat=1%27 [High] XSS | http://testphp.vulnweb.com/listproducts.php?cat=%3Cscript%3Ealert%281%29%3C%2Fscript%3E [*] Done! 2 findings saved

Reference

Severity Matrix

RCE โ€” Critical SSTI โ€” Critical SQLi โ€” High LFI โ€” High SSRF โ€” High XXE โ€” High JWT โ€” High IDOR โ€” High XSS โ€” Medium Open Redirect โ€” Medium