Skip to content

GRIM - Information Gathering and Vulnerability Scanning Tool

License

Notifications You must be signed in to change notification settings

swatv3nub/GrimPriv

Repository files navigation

GRIM - Information Gathering and Vulnerability Scanning Tool

Features

Information Gathering

  • WHOIS Lookup
  • GeoIP Lookup
  • HTTP Headers
  • DNS Lookup
  • Subnet Calculation
  • Nmap Port Scan
  • Sub-domain Finder
  • Reverse IP Lookup

Vulnerability Scanning

  • SQL Injection Detection
  • Cross-Site Scripting (XSS) Detection
  • Directory Traversal Detection
  • Remote File Inclusion (RFI) Detection
  • Local File Inclusion (LFI) Detection
  • Server-Side Request Forgery (SSRF) Detection
  • Email Header Injection Detection
  • Command Injection Detection
  • Cross-Site Request Forgery (CSRF) Detection
  • Insecure Direct Object References (IDOR) Detection
  • Open Redirect Detection
  • XML External Entity (XXE) Detection

Vulnerability Scanning Details

  • SQL Injection: Tests for SQL errors using common payloads
  • XSS: Tests for reflected XSS using script payloads
  • Directory Traversal: Tests for file system access using path traversal payloads
  • RFI: Tests for remote file inclusion using external URL payloads
  • LFI: Tests for local file inclusion using system file paths
  • SSRF: Tests for server-side request forgery using internal network payloads
  • Email Header Injection: Tests for CRLF injection and email header manipulation vulnerabilities
  • Command Injection: Tests for OS command execution vulnerabilities using system command payloads
  • CSRF: Checks for missing CSRF tokens in forms and state-changing requests
  • IDOR: Tests for insecure direct object references by comparing responses to different resource IDs
  • Open Redirect: Tests for unsafe redirects using external domain payloads
  • XXE: Tests for XML external entity injection using malicious XML payloads

All scans provide color-coded results:

  • Red: Potential vulnerability found
  • Green: No vulnerability detected

Crawling

  • Admin Panel Discovery
  • Backup File Discovery
  • General Site Crawling

Usage

  1. Clone the repository
  2. Run php grim.php
  3. Enter the target website (without http/https)
  4. Select scanning options

New Vulnerability Scanning Features

XSS Detection

GRIM now tests for Cross-Site Scripting vulnerabilities using common payloads:

  • <script>alert(1)</script>
  • "><script>alert(1)</script>

Directory Traversal Detection

GRIM checks for directory traversal vulnerabilities using test patterns:

  • ../../../../etc/passwd
  • ../index.php

The scanner will report potential vulnerabilities with color-coded results:

  • Red: Potential vulnerability found
  • Green: No vulnerability detected

Requirements

  • PHP 7.0+
  • cURL extension
  • DOM extension

Installation

sudo apt-get install php-curl php-xml
git clone https://github.com/swatv3nub/grim
cd grim
php grim.php

To-Do

  • Improve crawling functionality
  • Add more vulnerability tests
  • Enhance user interface
  • Implement a database for storing scan results
  • (IMPORTANT) Make the Vulnerability scanning a optional feature (toggle to enable or disable)
  • Add a feature to save the scan results to a file
  • Improve the user interface for the admin panel discovery

License

MIT License

About

GRIM - Information Gathering and Vulnerability Scanning Tool

Topics

Resources

License

Stars

Watchers

Forks

Languages