Skip to content

TEAMBCS/Web-Analyzer

Repository files navigation

Logo

Inspect β€’ Test β€’ Analyze
A Terminal-Based Web Inspection & Security Testing Lab - 2026

Python Textual Rich Aiohttp Aiohttp Version Platform Status


πŸ§ͺ About Web Analyzer

Web Analyzer is a modern, terminal-based web inspection & security testing lab built using Python and Textual.
It is crafted for ethical hackers, cybersecurity learners, web testers, and developers looking to explore HTTP internals.

Features a clean TUI for:

  • Crafting HTTP requests
  • Analyzing server responses
  • Generating and testing payloads
  • Vulnerability assessment

✨ Premium Highlights

  • Fully interactive Textual TUI with keyboard shortcuts
  • HTTP Request Inspector with full method support
  • Advanced Payload Generator & Vulnerability Scanner
  • Encoder / Decoder utilities (Base64/32/16, URL, HTML Entities, JWT)
  • Session, cookie & request history management
  • Predefined request templates for JSON, GraphQL, API keys, file uploads
  • Clean dark-theme hacker-style interface

πŸ”§ Core Modules

🌐 HTTP Request Inspector

  • Methods: GET, POST, PUT, DELETE, PATCH, HEAD, OPTIONS
  • Custom headers, cookies, parameters & body
  • Proxy support: HTTP / HTTPS / SOCKS4 / SOCKS5
  • SSL verification toggle & timeout control

πŸ” Encoder / Decoder Lab

  • Base64 / Base32 / Base16 (Hex)
  • URL Encode / Decode
  • HTML Entities
  • JWT inspection

πŸš€ Payload Generator

  • SQL Injection, XSS, Command Injection, Directory Traversal, SSRF, XXE
  • Template Injection, NoSQL, LDAP, XPath Injection
  • Custom payload creation, preview, & save

πŸ›‘οΈ Vulnerability Scanner

  • Detect SQLi, XSS, Directory Traversal, Command Injection
  • CSRF token checks, missing security headers
  • Exportable JSON reports with severity & affected parameters

πŸ” Login Page Detector

  • Auto-detect login forms
  • Discover username & password fields
  • Hidden input extraction
  • Ready-to-submit requests

⌨️ Keyboard Shortcuts

Shortcut Action
Ctrl + Q Quit
Esc Close modal
Tab Switch focus
Enter Confirm
Ctrl + M Select HTTP method
Ctrl + E Encoder / Decoder
Ctrl + G Payload Generator
Ctrl + V Vulnerability Scanner
Ctrl + T Request Templates
Ctrl + W Session Manager
Ctrl + O Import response headers
Ctrl + N Resend with edited headers

πŸ“ Project Structure


Web-Analyzer/
β”‚
β”œβ”€β”€ payloads_save/
β”‚   └── payloads_<timestamp>.txt
β”œβ”€β”€ vulnerability_scan_result/
β”‚   └── vulnerability_scan_<timestamp>.json
β”œβ”€β”€ request_history/
β”‚   └── request_history_<timestamp>.json
β”œβ”€β”€ Web_Analyzer_/
β”‚   └── Web_Analyzer_style.css
β”œβ”€β”€ MORE/
└── README.md


βš™οΈ Requirements

  • Python 3.12.12
  • Termux / Linux / macOS

Install Dependencies

pip install aiohttp textual beautifulsoup4

▢️ Run Web Analyzer

apt update && apt upgrade
pkg install python -y
pkg install python3 -y
pkg install git -y
git clone https://github.com/TEAMBCS/Web-Analyzer.git
cd Web-Analyzer
chmod +x *
chmod 777 *
chmod +w .
pip install -r web-analyzer.txt
python3 web_analyzer.py

or

bash start.sh

πŸ“Έ Screenshots

Screenshot 1 Β Β  Screenshot 2 Β Β 


πŸ“ƒ Note

Edit CSS Code as your wish.

If you found textual library install problem in kali linux machines or debian machines

  • use
pip install textual --break-system-packages --ignore-installed pygments

⚠️ Legal & Ethical Notice

For authorized testing and educational purposes only.

  • Do not test without explicit permission
  • Misuse may be illegal
  • Author takes no responsibility for improper use

πŸ‘€ Author Info

  • Developer :BLACK ZERO
  • GitHub: BLACK-ZER-0
  • Tool Owner : BANGLADESH CYBER SQUAD & TEAM SHADOW STRIKER

⭐ Support & Contribution

  • ⭐ Star this repository
  • πŸ”— Share with learners
  • πŸ›  Contribute improvements or bug fixes