A powerful and modular Python-based CLI tool for network scanning, vulnerability detection, optional exploitation, and stylish PDF report generation — all from a single IP input.
"A Python-based CLI tool that performs network scans, identifies vulnerabilities, optionally runs exploits, and generates clean PDF reports — all with a single IP input."
VulnScan360/
├── scan_engine/
│ ├── nmap_scanner.py # Runs and parses Nmap
│ ├── vuln_finder.py # CVE lookup using Vulners API or Searchsploit
│ └── exploit_module.py # (Optional) Metasploit automation
│
├── report_generator/
│ ├── report_template.html # Template report file
│ └── generate_report.py # Converts data → Markdown → PDF
│
├── core/
│ └── main.py # CLI entry point
│
├── scan_engine/
│ └── generated-reports.pdf
│
├── Utilities/
│ └── utilities for windows and linux
│
├── requirements.txt
│
├── README.md
│
└── .gitignore
| Function | Tool |
|---|---|
| Scanning | Nmap + python-nmap |
| Vuln Discovery | Vulners API / Searchsploit |
| Exploitation | Metasploit RPC (optional) |
| Reporting | Jinja2 + HTML + PDFKit |
| CLI Interface | argparse |
| Logging | Python logging module |
✅ Full port and service version scan
✅ CVE detection via Nmap Vulners script
✅ Risk classification per service
✅ Beautiful, color-coded PDF reports
✅ (Coming soon) CVE enrichment via Vulners/Searchsploit
✅ (Coming soon) Exploitation via Metasploit RPC
git clone https://github.com/Raqeeb27/VulnScan360.git
cd VulnScan360Create a virtual environment (optional but recommended):
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activateInstall required packages:
pip install -r requirements.txt🔹 Nmap Download Nmap and ensure it’s in your system PATH. Download here
🔹 Python Download Python and ensure it’s in your system PATH. Download here
🔹 wkhtmltopdf (for PDF generation) Already included in the project, can be downloaded from: here
🔹 Metasploit Framework (Optional) Install Metasploit
Enable and configure the RPC server for integration.
Basic Scan & Report (from project root directory)
python core/main.py --target 192.168.1.10-
Performs a full Nmap scan
-
Parses service, version, CVE script output
-
Generates a styled PDF report in /scan_reports/
The PDF includes:
IP summary & open ports
Risk-based color coding
CVE listings (if any)
Example:
Red border = High Risk
Yellow = Medium Risk
Green = Low Risk
View sample generated pdf report here
This tool is intended for educational and authorized security testing purposes only. Unauthorized scanning of systems without explicit permission is illegal and unethical. Use responsibly.
🔍 Implement vuln_finder.py using Vulners API / Searchsploit
💥 Add Metasploit RPC automation
📬 Email reports to recipient
🌐 Add multi-IP / CIDR range scanning
📊 Summary charts (optional dashboard)
Pull requests are welcome! For major changes, please open an issue first to discuss what you’d like to change.
This project is licensed under the GPL 3.0 License — see the LICENSE file for details.
Nmap
Vulners
wkhtmltopdf
Metasploit