Skip to content
Related Articles

Related Articles

Altair – Open Source Modular Web Vulnerability Scanner

Improve Article
Save Article
Like Article
  • Last Updated : 27 Jan, 2022

Vulnerability Scanning is the methodology to detect the security flaws in the target domain. We can detect these flaws by the manual method in which we can test the HTML elements like buttons, input boxes, and many more. But this approach is a bit lengthy approach, so we can use automated tools. Altair tool is an automated cyber security tool that has the potential to detect various types of security flaws like XSS, LFI, SQLi, and many more. This tool is automated in the Python Language and freely available on the GitHub platform.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of Altair Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd altair

Step 3: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.

python3  --help

Working with Altair Tool on Kali Linux OS

Example 1: Basic Vulnerability Scan 

python3 -u

In this example, we have given the target domain URL.

Altair tool is crawling the links or files from the target domain.

The tool has identified some of the vulnerabilities in the target domain

Example 2: Scanning only SQL Injection 

python3 –filter=sqli –load-modules=sqlmap –url=

In this example, we will be loading only sqlmap module to check SQLi vulnerability on the target domain.

The tool has loaded the sqlmap module and started the crawling process.

The tool has detected the SQLi Vulnerability in the target domain

In the below screenshot, we have detected information about the vulnerability identified.

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!