Skip to content
Related Articles

Related Articles

Improve Article
Save Article
Like Article

VulnX – CMS And Vulnerability Detection

  • Last Updated : 23 Sep, 2021

VulnX tool is an automated tool used for various purposes in Penetration Testing. VulnX tool performs CMS and Vulnerabilities Detection on the target domain, this tool is said to be an intelligent auto shell injector tool. VulnX is popular due to its fast CMS detection and Faster Scanner. VulnX tool gathers information like Subdomains, IP addresses, Country, Origin, Timezone, Region, etc. VulnX tool is developed in  Shell and Python language and it is available on the GitHub platform. This tool is free and open-source to use. 

Features of VulnX Tool

  • VulnX tool performs CMS Detection like WordPress, Joomla, Drupal, etc.
  • VulnX tool performs Information Gathering like Subdomains collection, Country Information, IP Addresses collection, etc.
  • VulnX tool is a Multi-Threaded tool.
  • VulnX tool supports Vulnerabilities Scanning on the target domain.
  • VulnX tool has Auto Shell Injector.
  • VulnX tool performs Exploit Dork Searcher on the target.

Installation of VulnX Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/anouarbensaad/vulnx.git

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd vulnx



Step 3: Change the permissions of install.sh file by using the following command.

sudo chmod +x install.sh

Step 4: Run the below command to verify the installation.

./install.sh

Step 5: Launching the tool by using the following command.

vulnx -h

Working with VulnX Tool on Kali Linux OS

Example 1: Sample commands: cms-gathering = all, -d subdomains-gathering, run – exploit

vulnx -u http://geeksforgeeks.org -l all -d -w --exploit

In this example, we are using the sample commands for collecting cms information, subdomains gathering, etc.



Example 2: Search single target site

vulnx -u http://geeksforgeeks.org

In this example, we are scanning a single target domain http://geeksforgeeks.org.

Example 3: Run exploit module

vulnx -u http://geeksforgeeks.org --exploit

In this example, we are running an exploit module against http://geeksforgeeks.org

Example 4: CMS Information Collection

vulnx -u http://geeksforgeeks.org --cms

In this example, we are collecting the information of CMS on the target domain.



Example 5: Subdomain & IP information collection

vulnx -u http://geeksforgeeks.org --domain-info

In this example, we are collecting Subdomain & IP information.

Example 6: Web site information collection

vulnx -u http://geeksforgeeks.org --web-info

In this example, we are collecting Web information like OS and Server details.

Example 7: Scan for open ports

vulnx -u http://geeksforgeeks.org --ports 443

In this example, we are checking the activeness of the port on the domain server. 

Example 8: DNS information collection

vulnx -u http://geeksforgeeks.org --dns

In this example, we are collecting DNS information.




My Personal Notes arrow_drop_up
Recommended Articles
Page :