Live vulnerability scanning

Find vulnerabilities
before attackers do.

SecureGuard orchestrates five enterprise security tools — Nmap, Nuclei, Nikto, SSLScan, and SQLMap — and delivers a complete risk report with actionable fix steps in minutes.

0

Vulnerabilities found

0

Templates checked

0

Reports generated

2 Critical found
Report ready ✓
Scan Report Live
0
⚠ High Risk — Immediate Action Required
Scanning example.com 0%
Open Port 22 — Outdated SSHCritical
SQL Injection — /login endpointCritical
Weak SSL Cipher — RC4 EnabledHigh
Exposed .env FileHigh
Missing HSTS HeaderMedium
Nmap · Nuclei · Nikto · SSLScan · SQLMap
Async Celery + Redis scan engine
Auto PDF + JSON reports
SSRF protected
JWT authentication
AWS ready
The Process

From domain to full report
in minutes

A 15-step automated pipeline orchestrates 5 security tools, calculates your risk score, and delivers a complete remediation plan.


1

Enter Domain

URL input — Quick or Deep mode

2

API Validates

SSRF protection blocks private IPs

3

Job Queued

Celery + Redis async background task

4

DNS Resolved

Target IP verified and reachable

5

Nmap Scan

Open ports, services, OS fingerprints

6

Nuclei Scan

1000+ CVE templates against target

7

Nikto Scan

Outdated software, exposed files

8

SSL Check

Cert validity, weak ciphers, expiry

9

SQLMap

SQL injection on forms and URLs

10–15

Score → Report

Parse → Score → PDF → Dashboard

Scanner Engine

Five industry tools.
One unified platform.

Each tool runs as an isolated subprocess inside a Celery worker, with output parsed into structured vulnerability objects.


🗺

Nmap

Port scanning, service detection, OS fingerprinting across your entire port range.

nmap -sV --open -p 1-10000
  • Open port discovery
  • Service version detection
  • Dangerous port alerts

Nuclei

Template-based scanner with 1,000+ CVE, misconfiguration, and exposure checks.

nuclei -u https://target -json
  • 1000+ vulnerability templates
  • CVE detection
  • Exposure checks
🔍

Nikto

Web server scanner for outdated software, dangerous files, and misconfigurations.

nikto -h https://target -json
  • Outdated software detection
  • Exposed file checks
  • Header misconfiguration
🔐

SSLScan

Deep TLS/SSL analysis — certificate validity, weak ciphers, protocol version checks.

sslscan --xml=output.xml
  • Certificate expiry check
  • RC4, DES, MD5 detection
  • SSL2/SSL3 protocol flags
💉

SQLMap

Automated SQL injection detection on all forms and URL parameters. Deep scan only.

sqlmap -u url --batch --level=1
  • Parameter injection tests
  • Database enumeration
  • Critical severity flag
Platform Features

Everything you need to
secure any domain


📊

Security Dashboard

At-a-glance overview of your security posture — score ring, metric tiles, and recent scan history.

  • Risk score 0–100 with color coding
  • Critical, High, Medium, Low counts
  • Last 5 scans with status badges
  • Quick scan launch button

Live Scan Console

Real-time WebSocket log streaming as your scan runs. Watch each tool execute line by line.

[10:31:02][INFO]Scan started for example.com
[10:31:04][NMAP]Port 22/tcp open — OpenSSH 7.4
[10:31:05][NMAP]Dangerous port detected: 3389
[10:31:18][NUCLEI]CVE-2021-44228 found
[10:31:42][SSL]Weak cipher RC4 enabled
[10:33:10][SQLMAP]Injection at /login?id=1
[10:35:00][DONE]Score: 34 — 3 Critical
🔓

Vulnerability Table

Filter by scan and severity. Click any row for full description and actionable fix suggestion.

  • Colour-coded severity badges
  • Affected URL + tool source
  • Fix suggestion per vulnerability
  • Export to CSV
📁

Automated PDF & JSON Reports

Every completed scan auto-generates a professional PDF report and structured JSON export — ready to share with clients, investors, or your team.

PDF Report
  • Cover + executive summary
  • Full risk score breakdown
  • Complete vulnerability list
  • Asset discovery results
  • Fix recommendations
JSON Export
  • Structured vulnerability objects
  • CVSS scores per finding
  • Attack path data
  • Asset metadata
  • Scan timeline events
🌐

Asset Discovery

Every subdomain, IP, open port, and technology stack discovered — organised in filterable tabs.

  • Domains & subdomains
  • IP address mapping
  • Open ports + services
  • Technology fingerprinting
🔑

JWT Authentication

Secure stateless auth with bcrypt passwords, refresh token rotation, and admin role support.

  • Access token: 15 min expiry
  • Refresh token: 7-day cookie
  • bcrypt password hashing
  • Admin role middleware
⚙️

Fix Requests

Request professional remediation with one click. Track status from Pending to Done.

example.com fixIn Progress
client-site.io fixDone
startup-app.com fixPending
📅

Scan History

Browse, search, and manage all past scans. Paginated table with domain search and delete.

  • Search by domain name
  • Paginated (10 rows/page)
  • Quick/Deep type badges
  • One-click report download
🛡

SSRF Protection

Every scan target passes validation that blocks private IPs, loopback addresses, and internal network ranges.

example.com → allowed
192.168.1.1 → blocked
127.0.0.1 → blocked
10.0.0.1 → blocked
Attack Paths

See how attackers chain
your vulnerabilities

SecureGuard's risk engine builds visual attack chains — showing exactly how an attacker could combine findings to escalate access.


Medium

Open Port 22

SSH exposed to public internet

High

Outdated OpenSSH

Version 7.4 with known CVEs

Critical

Brute Force

No rate limiting on auth attempts

Critical

Root Access

Full server compromise achieved

Risk Narrative

An attacker could exploit the public-facing SSH service running outdated OpenSSH 7.4 (CVE-2018-15473) to enumerate valid usernames, perform a brute-force attack against weak credentials, and ultimately achieve root-level server access with full data exfiltration capability.

Product Preview

Your security command centre

A full-featured React SPA with 9 pages — all connected to real scan data via the FastAPI backend.


SecureGuard — Dashboard
📊Dashboard
New Scan
🔓Vulnerabilities
🌐Assets
🗺Attack Paths
📄Reports
🔧Fix Requests
📅History
⚙️Settings
0
Critical Vulns
0
High Severity
0
Total Scans
0
Assets Found
DomainDateTypeScoreStatus
example.com2024-01-15Deep34Done
startup-app.io2024-01-14Quick61Done
client-site.comNowDeepRunning
Risk Engine

Transparent scoring formula

No black boxes. Your risk score is calculated from a weighted formula based on vulnerability severity counts — fully auditable.


# Risk Score Formula
score = 100 - (
  critical × 25 +
  high    × 10 +
  medium × 5 +
  low    × 2
)

# Example: 3 critical, 5 high
score = 100 - (75 + 50) = 0

# Min: 0 — Max: 100 (no vulns)

Example scan breakdown

Critical
3
High
8
Medium
14
Low
7
Info
4
Calculated Risk Score
⚠ High Risk — Immediate remediation required
34
Pricing

Simple, transparent plans

Built for freelancers, startups, and agencies. All plans include PDF reports and vulnerability tracking.

Free
0/month

Get started with basic scanning


1 scan per month
Quick scan only
Basic vulnerability report
PDF download
Deep scan
SQLMap analysis
API access
Agency
7,999/month

For agencies and enterprise teams


Unlimited scans
All Pro features
White-label reports
Admin panel access
Priority fix requests
CI/CD webhook
Dedicated support
Technology Stack

Built on proven infrastructure

Every layer chosen for reliability, performance, and security. Deployable to AWS with Docker Compose in a single command.


React 18

Frontend SPA

FastAPI

Python backend

Celery 5

Async jobs

Redis

Queue + logs

JSON Storage

Local file DB

Docker

Container deploy

TailwindCSS

UI styling

Recharts

Dashboard charts

JWT + bcrypt

Authentication

AWS EC2

Cloud hosting

Nginx

Reverse proxy

Razorpay

India payments

Get Started Today

Secure your domain
in minutes

Domain in → Automated multi-tool scan → Risk score + PDF report + Fix workflow.
No security knowledge required.

✓ No credit card for free plan ✓ Scan starts in under 60 seconds ✓ Cancel anytime