The Web Analyzer Tool is a comprehensive Python-based application designed for domain analysis, including WHOIS information retrieval, DNS records, subdomain discovery, SEO analysis, web technology detection, and advanced security analysis.
-
Domain Information Retrieval
- Fetches WHOIS information (registrar, creation date, expiry date, etc.)
- Detects privacy protection, DNSSEC status, and SSL details.
- Retrieves server provider and physical location information.
-
DNS Records Analysis
- Resolves A (IPv4), AAAA (IPv6), MX (Mail Servers), TXT (Verification), and NS (Name Server) records.
- Measures DNS response time.
-
Subdomain Discovery
- Uses Subfinder to discover subdomains of a given domain.
- Saves results in the corresponding domain folder under
logs/
.
-
SEO and Analytics Analysis
- Extracts meta tags (description, keywords, canonical links).
- Identifies Open Graph and Twitter tags.
- Detects verification tags (Google, Bing, Yandex).
- Recognizes analytics tools (Google Analytics, Tag Manager, Facebook Pixel, etc.).
- Evaluates JavaScript frameworks and structured data.
- Measures page load time and checks performance metrics.
- Analyzes
robots.txt
andsitemap.xml
files.
-
Web Technology Detection
- Detects backend technologies (PHP, Django, Node.js, etc.).
- Identifies frontend frameworks (React, Angular, Bootstrap, etc.).
- Recognizes CDN services and checks for compression and caching policies.
-
Advanced Security Analysis
- Detects Web Application Firewalls (WAFs).
- Analyzes HTTPS enforcement and SSL certificates.
- Examines security headers (CSP, HSTS, etc.).
- Checks Cross-Origin Resource Sharing (CORS) policy.
-
Subdomain Takeover Detection
- Scans discovered subdomains for potential vulnerability to subdomain takeover attacks.
- Categorizes vulnerabilities by confidence level (High, Medium, Low).
- Identifies specific services and potential exploitation methods.
- Provides mitigation recommendations for vulnerable subdomains.
- Highlights critical vulnerabilities that require immediate attention.
-
Advanced Content Scanner
- Performs deep web content analysis across multiple pages.
- Discovers and analyzes sensitive information leakage.
- Detects potential JavaScript-based vulnerabilities.
- Identifies Server-Side Request Forgery (SSRF) risks.
- Scans for exposed secrets, API keys, and credentials.
- Provides detailed reporting on high-severity findings.
- Supports configurable scanning depth and page limits.
Ensure the following dependencies are installed:
- Python 3.x
- Go (for Subfinder)
- Git
-
Clone the repository:
git clone https://github.com/frkndncr/WebAnalyzer.git cd WebAnalyzer
-
Run the Install Python Dependencies:
pip install -r requirements.txt
-
Run the setup script:
./setup.sh
This script will:
- Install required system packages.
- Install and configure Subfinder.
-
Verify the installation:
- Ensure
subfinder
is available in your PATH. - Ensure all Python modules are installed successfully.
- Ensure
-
Run the main script:
python main.py
-
Enter the domain name when prompted:
Please enter a domain name (e.g., example.com): yourdomain.com
-
The tool will:
- Perform all analyses.
- Display results on the terminal.
- Save all results in a structured JSON file under
logs/{domain}/results.json
.
.
├── main.py # Entry point of the application
├── setup.sh # Installation script
├── requirements.txt # Python dependencies
├── logs/ # Directory to store analysis results
├── modules/ # Directory containing all analysis modules
│ ├── domain_dns.py # DNS record analysis module
│ ├── domain_info.py # WHOIS information retrieval module
│ ├── seo_analysis.py # SEO and analytics analysis module
│ ├── security_analysis.py# Security analysis module
│ ├── subfinder_tool.py # Subdomain discovery module
│ ├── web_technologies.py # Web technology detection module
│ ├── subdomain_takeover.py # Subdomain takeover vulnerability detection module
│ ├── advanced_content_scanner.py # Advanced web content scanning module
└── tests/ # Test scripts for the project
└── test_main.py # Unit tests for main.py
The results are saved as results.json
in the corresponding domain folder:
{
"Domain Information": {
"Domain": "example.com",
"Registrar Company": "Registrar Name",
"Creation Date": "2020-01-01",
"End Date": "2025-01-01",
"Privacy Protection": "Effective",
"Server Provider": "Cloudflare",
"Physical Location": "San Francisco, US"
},
"DNS Records": {
"A Records (IPv4)": ["192.168.0.1"],
"MX Records (Mail Servers)": ["mail.example.com"],
"Response Time (ms)": 35.5
},
"Subdomains": ["www.example.com", "blog.example.com"],
"SEO Analysis": {
"Meta Tags": {"Description": "Example description"},
"Analytics Tools": {"Google Analytics IDs": ["UA-123456-7"]}
},
"Web Technologies": {
"Backend Technologies": ["PHP", "WordPress"],
"Frontend Technologies": ["Bootstrap"],
"Content Delivery Network (CDN)": "Cloudflare"
},
"Security Analysis": {
"Web Application Firewall": "Cloudflare",
"SSL Info": {"Issuer": "Let's Encrypt"}
},
"Subdomain Takeover": {
"Vulnerable Subdomains": [
{
"subdomain": "dev.example.com",
"vulnerability_type": "Heroku Subdomain Takeover",
"confidence": "High",
"service": "Heroku",
"exploitation_difficulty": "Medium",
"mitigation": "Claim the subdomain or remove the DNS record"
}
],
"Statistics": {
"total_subdomains_checked": 10,
"high_confidence_vulnerabilities": 1,
"medium_confidence_vulnerabilities": 0,
"low_confidence_vulnerabilities": 0
}
},
"Advanced Content Scan": {
"summary": {
"total_urls_crawled": 50,
"total_js_files": 20,
"total_api_endpoints": 15
},
"secrets": [
{
"type": "API Key",
"source_url": "https://example.com/js/config.js",
"severity": "High"
}
],
"js_vulnerabilities": [
{
"type": "Cross-Site Scripting (XSS)",
"source_url": "https://example.com/main.js",
"severity": "Medium"
}
],
"ssrf_vulnerabilities": [
{
"type": "Potential SSRF Endpoint",
"source_url": "https://example.com/proxy",
"severity": "High"
}
]
}
}
Feel free to contribute to this project by:
- Reporting issues.
- Suggesting features.
- Submitting pull requests.
This project is licensed under the MIT License.
- İnstagram: https://www.instagram.com/f3rrkan/
- LinkedIn: https://www.linkedin.com/in/furkan-dincer/
- Mail: hi@c4softwarestudio.com