Custom Web Exploit Toolkit is a Python-based CLI tool for automated web vulnerability testing.
It helps penetration testers quickly identify common security flaws with minimal manual intervention.
⚠ For educational and authorized security testing purposes only.
Misuse of this tool is illegal.
- Modules:
- Reflected XSS (
xss) - CSRF (
csrf) - Clickjacking (
clickjacking) - SQL Injection (
sqli) – error, union, and time-based - HTML Injection (
htmli) - Open Redirect (
openredirect) - Directory Traversal (
traversal) – OS-aware payload optimization
- Reflected XSS (
- Injection Modes:
- URL parameter (
{{param}}placeholder) - Form-based (auto-discovery)
- Manual POST/GET injection (
--method,--data)
- URL parameter (
- Traversal Extras:
- Quick/Full scan modes
- OS detection
- Payload randomization
- Request throttling
- Auth Support:
--cookiefor session handling--headerfor custom HTTP headers
git clone https://github.com/shantanuv09/Web-Exploit-Toolkit.git cd Web-Exploit-Toolkit pip install -r requirements.txtRuns the XSS module by replacing {{param}} in the URL with payloads.
python main.py -u "http://target.com/page.php?input={{param}}" -m xssRuns both XSS and SQLi modules.
python main.py -u "http://target.com/page.php?input={{param}}" -m xss sqliSends payloads to parameters in POST data.
python main.py -u "http://target.com/form.php" \ -m sqli \ --method POST \ --data "username={{param}}&password=pass123"Performs full traversal scan with payload order randomized and request throttling enabled.
python main.py -u "http://target.com/file.php" \ -m traversal \ --method POST \ --data "file={{param}}&Submit=Submit" \ --mode full \ --throttle 0.2Web-Exploit-Toolkit/ │ ├── main.py ├── core/ │ ├── scanner.py │ └── reporter.py ├── modules/ │ ├── csrf.py │ ├── clickjacking.py │ ├── xss.py │ ├── sqli.py │ ├── htmli.py │ ├── openredirect.py │ └── traversal.py ├── payloads/ │ ├── xss/reflected.txt │ ├── sqli/ │ ├── traversal/deep_traversal.txt │ └── ... └── requirements.txtThis tool is intended for authorized penetration testing and educational purposes only. Unauthorized use against systems without permission is illegal and punishable under applicable laws.