Web Application Analysislfirfircevulnerability scannerweb scannerdirectory checkdynamic checks

Uniscan

Uniscan is a simple scanner for Remote File Include (RFI), Local File Include (LFI), and Remote Command Execution (RCE) vulnerabilities. It performs directory checks, file checks, and dynamic vulnerability tests on web targets.

Description

Uniscan is designed to identify common web application vulnerabilities such as LFI, RFI, and RCE. It scans specified URLs for accessible directories, files, and dynamic elements that may indicate exploitable conditions. The tool also includes plugins for detecting specific issues like FCKeditor upload tests, web backdoors, phpinfo disclosure, and more.

Use cases include reconnaissance of web servers for vulnerability assessment, particularly during penetration testing of Apache or similar environments. It supports both command-line and GUI modes via uniscan-gui, making it suitable for quick scans or background operations.

The scanner crawls targets to find URLs and applies checks for robots.txt, sitemap.xml, and various plugins, providing output on discovered paths and potential vulnerabilities.

How It Works

Uniscan operates by sending HTTP requests to the target URL for directory, file, and dynamic checks. It uses plugins like FCKeditor upload test, Web Backdoor Disclosure, phpinfo() Disclosure, Timthumb vulnerability, and others to probe for vulnerabilities. The crawler discovers additional URLs (e.g., 27 URLs found in the example), checks server responses (e.g., CODE 200), and reports findings such as accessible directories like /joomla/ and /wordpress/. It supports background mode and multiple input formats including URLs, files, IPs, and search queries.

Installation

bash
sudo apt install uniscan

Flags

-hhelp
-u<url> example: https://www.example.com/
-f<file> list of url's
-bUniscan go to background
-qEnable Directory checks
-wEnable File checks
-eEnable robots.txt and sitemap.xml check
-dEnable Dynamic checks

Examples

Scan the given URL for vulnerabilities, enabling directory and dynamic checks
uniscan -u http://192.168.1.202/ -qd
Scan a single URL with directory, file, robots/sitemap, and dynamic checks
perl ./uniscan.pl -u http://www.example.com/ -qweds
Scan a list of URLs from a file in background with all checks enabled
perl ./uniscan.pl -f sites.txt -bqweds
Scan using interface or preset 'uniscan'
perl ./uniscan.pl -i uniscan
Scan a specific IP address
perl ./uniscan.pl -i "ip:xxx.xxx.xxx.xxx"
Scan using search operator like inurl:test
perl ./uniscan.pl -o "inurl:test"
Scan a URL with recursive or additional option -r
perl ./uniscan.pl -u https://www.example.com/ -r
Display help and options
uniscan -h
Updated 2026-04-16kali.org ↗