IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

VULNERABILITY SCANNER USING PYTHON

AUTHORS:
Madhumitha
Ajmal Khan S
Mentor
Dr. Sheela K
Affiliation
Computer Science VISTAS, Chennai
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

This paper presents a vulnerability scanner implemented in Python to identify security weaknesses across networked systems and web applications. The scanner integrates multiple modules to perform comprehensive security assessment, including network discovery, service version detection, port scanning, and web vulnerability analysis. A modular architecture enables easy extension with new plugins for common protocols (HTTP, SSH, FTP, SMB) and data sources such as CVE databases and vendor advisories. The tool emphasizes security best practices including least-privilege operation, secure credential handling, and audit logging. Output is generated in both human-readable formats and machine-friendly JSON, with options to export reports to HTML or CSV for integration with CI/CD pipelines. By providing an extensible, Python-based solution, this scanner enables security teams to efficiently identify, prioritize, and remediate vulnerabilities across heterogeneous infrastructures.

Keywords
Article Metrics
Article Views
43
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Madhumitha, & S, A. K. (2026). Vulnerability Scanner using Python. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.147

Madhumitha, , and Ajmal S. "Vulnerability Scanner using Python." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.147.

Madhumitha, , and Ajmal S. "Vulnerability Scanner using Python." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.147.

References
1.Kurose, F. & Ross, K. W.. "Computer Networking: A Top-Down Approach." Pearson, 7th Edition, 2017.

2.Stallings, . "Network Security Essentials: Applications and Standards." Pearson, 6th Edition, 2016.

3.Matthes, . "Python Crash Course." No Starch Press, 2nd Edition, 2019.

4.Seitz, . "Black Hat Python: Python Programming for Hackers and Pentesters." No Starch Press, 2nd Edition, 2021.

5.OWASP "OWASP Top Ten Web Application Security Risks." https://owasp.org, 2021.

6.Various "Automated Vulnerability Detection Techniques in Network Security." International Journal of Computer Science and Information Security, Vol. 18, 2020.

7."Web Application Security Testing Using Python Tools." IEEE Conference on Cybersecurity, 2022.

8.IRJET. "A Study on Network Vulnerability Scanning Tools and Techniques." International Research Journal of Engineering and Technology, Vol. 9, 2022
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
AI- Based Internship Recommendation Engine for PM Internship Scheme
string(14) "Srushti Bogale" Bogale, S.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.289
Ethnobotanical Studies of Medicinal Plants used by Tribal Communities in Uttar Baster, Chhattisgarh, India
string(14) "Dipanyita Bala" Bala, D.
(2026)
DOI: 10.55041/ijsmt.v2i3.012
Auto Cruise Control System using Fuzzy Logic
string(11) "Nikhil Kadu" Kadu, N.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.342
Scroll to Top