XploitGuard: Automated Vulnerability Scanning Tool

Authors

  • Ankit Verma Student, Apex Institute of Technology, Chandigarh University, Mohali, India
  • Amit Kumar Singh Student, Apex Institute of Technology, Chandigarh University, Mohali, India
  • Divij Shukla Student, Apex Institute of Technology, Chandigarh University, Mohali, India
  • Rajveer Sharma Student, Apex Institute of Technology, Chandigarh University, Mohali, India
  • Sheetal Laroiya Assistant Professor, Apex Institute of Technology, Chandigarh University, Mohali, India

Abstract

Vulnerability scanning is the process of discovering security vulnerabilities in computer systems, networks, and applications with the use of advanced scanning mechanisms. The research presents an automated state-of-the-art vulnerability scanning tool developed to improve organizational cybersecurity by enabling proactive defense strategies. The tool employs a combination of automated scanning techniques and human intelligence in the identification of existing vulnerabilities, misconfigurations, and unauthorized access points. Some of its features include network reconnaissance, system fingerprinting, and source code review and application configuration. The results are presented in a clear, actionable format in which the security professional has a clear way through prioritizing and patching vulnerabilities that conform to industry regulations. The tool is suited towards validating security for local networks and web environments by scanning IP addresses and URLs and is checking for vulnerable ports. In this internet-and-wireless-network-reliant era, Nictus, nuclei, Shodan, and other tools safeguard digital infrastructure. This paper emphasizes proactive vulnerability management as a strong defense against constantly evolving cyber dangers.

Downloads

Download data is not yet available.

Downloads

Published

19-06-2025

Issue

Section

Articles

How to Cite

[1]
A. Verma, A. K. Singh, D. Shukla, R. Sharma, and S. Laroiya, “XploitGuard: Automated Vulnerability Scanning Tool”, IJRESM, vol. 8, no. 6, pp. 56–64, Jun. 2025, Accessed: Jun. 23, 2025. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/3299