RapidScan is a python based scanning device utilized for dissecting vulnerabilities in web applications. The apparatus is outfitted with scanning utilities like Nmap, Golismero, Nikto, Uniscan, and Dnsrecon. The tool runs these services to discover vulnerabilities in web applications. Some outstanding checks performed by the instrument incorporate XSS, SQLi, DNS zone transfer, Local File Inclusion (LFI), Remote File Inclusion (RFI), open directory vulnerabilities, open ports, and SSL-related vulnerabilities. The device discovers the weaknesses as well as arranges them into low, medium, high, and basic classes as per the risk definition.
Visit the “https://github.com/skavngr/rapidscan” GitHub page to download and view more information about it.
Clone the tool to the “/opt” directory.
Ex: (root@kali:/opt# git clone https://github.com/skavngr/rapidscan.git).
Then run it using the “python” command.
Ex: (root@kali:/opt/rapidscan# python rapidscan.py).
Once it is started, you’ll be presented with help and usage information.
To perform a basic vulnerability scanning on a target website, provide the victim’s URL before you run the tool.
Ex: (root@kali:/opt/rapidscan# python rapidscan.py http://10.10.10.10).
Rapidscan verifies that the supported scanning tools are available before conducting an in-depth scan of the target web application. A total of 80 vulnerability checks are performed by the program.
On the off chance that vulnerability is discovered, it will display in the filtering results alongside their threat levels. RapidScan likewise gives an observed data about the perceived weakness and remediation proposals.