Skip to content

Penetration Testing Tools

  • Home
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology
  • Home
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology

Penetration Testing Tools

  • Open Source Tool

Logsensor: discover login panels, and POST Form SQLi Scanning

by ddos · Published January 26, 2025 · Updated January 26, 2025

Logsensor

A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning

Features

  • login panel Scanning for multiple hosts
  • Proxy compatibility (http, https)
  • Login panel scanning is done in multiprocessing

Installation

git clone https://github.com/Mr-Robert0/Logsensor.git
cd Logsensor && sudo chmod +x logsensor.py install.sh
pip install -r requirements.txt
./install.sh

Use

python logsensor.py --help

usage: logsensor.py [-h --help] [--file ] [--url ] [--proxy] [--login] [--sqli] [--threads]

optional arguments:
-u , --url Target URL (e.g. http://example.com/ )
-f , --file Select a target hosts list file (e.g. list.txt )
--proxy Proxy (e.g. http://127.0.0.1:8080)
-l, --login run only Login panel Detector Module
-s, --sqli run only POST Form SQLi Scanning Module with provided Login panels Urls
-n , --inputname Customize actual username input for SQLi scan (e.g. 'username' or 'email')
-t , --threads Number of threads (default 30)
-h, --help Show this help message and exit

 

Example

Multiple hosts scanning to detect login panels

  • You can increase the threads (default 30)
  • only run the login detector module
    python3 logsensor.py -f <subdomains-list>
    python3 logsensor.py -f <subdomains-list> -t 50
    python3 logsensor.py -f <subdomains-list> –login

Targeted SQLi form scanning

  • can provide only specific url of the login panel with –sqli or -s flag for running only SQLi form scanning Module
  • turn on the proxy to see the requests
  • customize the user input name of the login panel with the actual name (default “username”)
    python logsensor.py -u www.example.com/login –sqli
    python logsensor.py -u www.example.com/login -s –proxy http://127.0.0.1:8080
    python logsensor.py -u www.example.com/login -s –inputname email

Copyright (C) 2023 Mr-Robert0

Source: https://github.com/Mr-Robert0/

Share

Tags: discover login panelsLogsensor

Follow:

  • Next story PoolParty: A set of fully-undetectable process injection techniques
  • Previous story EvilSlackbot: A Slack bot phishing framework for Red Teaming exercises

Search

MAKE THE WEBSITE ONLINE

  • Popular Posts
  • Tags
  • AI Security

    Open Source Tool

    Damn Vulnerable MCP: Educational Project Exposes Critical Security Flaws in AI Protocol

    July 3, 2025

  • Docker Security

    Open Source Tool

    Varunastra: Securing the Depths of Docker

    June 4, 2025

  • Supply Chain Security

    Open Source Tool

    SadGuard: Dynamic Code Analysis + Supply Chain Detection Attack

    June 5, 2025

  • Open Source Tool

    sh4d0wup: Signing-key abuse and update exploitation framework

    June 5, 2025

  • Supply Chain Security

    Open Source Tool

    SupplyShield: Fortify Your Software Supply Chain

    June 6, 2025

  • Amazon AMD Android Apple ARM Artificial intelligence Asus ChatGPT chrome cyberattack cybersecurity facebook Firefox Github google Google Chrome Huawei India Intel Lenovo LG Linux Linux Kernel malware MediaTek Meta Microsoft microsoft edge MSI Nvidia OpenAI Qualcomm ransomware Samsung SK Hynix Sony TSMC ubuntu vulnerability windows Windows 7 Windows 10 Windows 10X Windows 11 Xbox




Reward

Brilliantly

SAFE!

meterpreter.org

Content & Links

Verified by Sur.ly

2022

  • Home
  • About Us
  • Contact Us
  • DMCA NOTICE
  • Privacy Policy

Penetration Testing Tools © 2025. All Rights Reserved.