Ready to Start Your Career?

Tulpar - Python Web Application Vulnerability Scanner + Telnetlib

anilbaranyelken 's profile image

By: anilbaranyelken

May 8, 2018

This brief tutorial/guide is just to provide you with some basic information about Tulpar and port scanning. Tulpar means winged horse in Turkish mythology. It is an open source web vulnerability scanner for written to make web penetration testing automated. Tulpar has the following features:
  • Sql Injection (GET Method)
  • XSS (GET Method)
  • Crawl
  • E-mail Disclosure
  • Credit Card Disclosure
  • Whois
  • Command Injection (GET Method)
  • Directory Traversal (GET Method)
  • File Include (GET Method)
  • Server Information
  • Technology Information
  • X-Content-Type Check
  • X-XSS-Protection Check
  • TCP Port Scanner
  • robots.txt Check
  • URL  Encode
  • Certification Information
  • Available Methods
  • Cyber Threat Intelligence
  • IP2Location
  • File Input Available Check
Installation:git clone tulparpip install -r requirementsUsage:python action web_URL actionAction:full xss sql fuzzing e-mail credit-card whois links portscanner url
  • Encode cyberthreatintelligence command
  • Injection directory
  • Traversal file
  • Include header
  • Check certificate methodIP2Location FileInputAvailableweb_URL     URL
Github + Kitploit
*Bonus: Telnetlib Port ScannerWe will write a port scanner with python telnetlib module.First of all we will import this module.-> import telnetlibAfter we will assign IP address to scan:->host=""Related IP address and  port tries to read information banner.->baglanti=telnetlib.Telnet(host,port)->baglanti.write("n")->print "n",str(port)," - ",baglanti.read_all().splitlines()[0]->baglanti.close()The complete code is as follows:import telnetlibhost=""for port in range(1,1024,1):try:baglanti=telnetlib.Telnet(host,port)baglanti.write("n")print "n",str(port)," - ",baglanti.read_all().splitlines()[0]baglanti.close()except:passGithub
Schedule Demo