Skip to main content

No project description provided

Project description

DUTVulnScanner - Cross-platform Vulnerability Scanner

🔍 A comprehensive, modular vulnerability scanning framework with support for multiple scanning tools and execution environments.

Features

  • Multiple Scanning Tools:
    • Recon: subfinder, naabu, httpx, nmap, whatweb, whois - Information gathering & discovery
    • Scanners: nuclei, testssl, sslscan, nikto - Vulnerability detection & SSL/TLS testing
    • Validators: dalfox, sqlmap, hydra - Vulnerability verification (opt-in)
  • Local Execution: Execute scans directly on your local machine
  • Smart Correlation: Automatically correlates findings from multiple tools
  • Multiple Report Formats: Generate reports in HTML, JSON, PDF, and SARIF
  • Customizable Profiles: Pre-configured scanning profiles for different scenarios
  • Modern CLI: Beautiful command-line interface built with Typer and Rich

Installation

🚀 Quick Install (Recommended for Kali Linux)

One-command installation:

# Install globally using pipx (recommended)
pipx install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git

# Or using pip
pip install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git

Note: If pipx is not installed:

sudo apt install pipx
pipx ensurepath
source ~/.bashrc

From Source (Development)

# Clone and install
git clone https://github.com/DinhManhAVG/CLI-Cross-Platform.git
cd CLI-Cross-Platform
pip install -e .

Verify Installation

dutVulnScanner --version
dutVulnScanner --help

📖 For detailed installation instructions, see INSTALL.md

Quick Start

Interactive Shell Mode (Recommended for beginners)

Start an interactive session where you can configure and run scans without typing dutVulnScanner every time:

dutVulnScanner shell

Inside the shell:

dutVulnScanner: help                           # Show all commands
dutVulnScanner: set target example.com         # Set your target
dutVulnScanner: set profile web                # Choose a profile
dutVulnScanner: show options                   # Review settings
dutVulnScanner: scan                           # Run the scan
dutVulnScanner: exit                           # Exit shell

Command-Line Mode

Choose Your Profile

List all available profiles to see which one fits your needs:

dutVulnScanner profile list

Common Usage Scenarios

Quick Security Check (~10 min)

dutVulnScanner scan run example.com --profile quick

Basic Reconnaissance (~30 min)

dutVulnScanner scan run example.com --profile recon

Complete Discovery Pipeline (~2 hours)

Subdomain enumeration → Port scanning → HTTP probing → Service detection

dutVulnScanner scan run example.com --profile discovery_full

Web Application Testing (~1 hour)

dutVulnScanner scan run https://example.com --profile web

Vulnerability Scanning (~3 hours)

dutVulnScanner scan run example.com --profile vuln_scan

Full Security Assessment (~6 hours)

dutVulnScanner scan run target.com --profile full_scan --output full_results.json

⚠️ Deep Testing (Authorization Required!)

# XSS, SQLi, brute-force testing - Only with written permission!
dutVulnScanner scan run target.com --profile deep_test

Generate Reports

dutVulnScanner report generate results.json report.html --format html

View Profile Details

dutVulnScanner profile show recon
dutVulnScanner profile show discovery_full

List Available Profiles

dutVulnScanner profile list

Architecture

dutVulnScanner/
├── cli/                # Command-line interface (Typer)
├── core/               # Core logic (orchestrator, config, schema, correlation)
├── runners/            # Local execution environment
├── plugins/            # Security scanning plugins
│   ├── recon/         # subfinder, naabu, httpx, nmap, whatweb, whois
│   ├── scanners/      # nuclei, testssl, sslscan, nikto
│   └── validators/    # dalfox, sqlmap, hydra
├── reporting/          # Report generation (builder, templates)
└── profiles/           # Scan profiles (recon, discovery_full, vuln_scan, deep_test)

Security Warning

Important: Always ensure you have authorization before scanning any target. Unauthorized scanning may be illegal.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dutvulnscanner-0.1.1.tar.gz (44.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dutvulnscanner-0.1.1-py3-none-any.whl (71.6 kB view details)

Uploaded Python 3

File details

Details for the file dutvulnscanner-0.1.1.tar.gz.

File metadata

  • Download URL: dutvulnscanner-0.1.1.tar.gz
  • Upload date:
  • Size: 44.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.9

File hashes

Hashes for dutvulnscanner-0.1.1.tar.gz
Algorithm Hash digest
SHA256 1ff28a75e88dcf1060913f95a56a5348addc5e2946bfca4eeb87b8cc294d9f47
MD5 fe189fac795a420b62d5bbe26fb7bde7
BLAKE2b-256 1c623c8d152d7d30b3924ff5fadc378852906e89abc0ffa97161a1c690406827

See more details on using hashes here.

File details

Details for the file dutvulnscanner-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: dutvulnscanner-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 71.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.9

File hashes

Hashes for dutvulnscanner-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 128a08c98bb78ef3c557db788bb3c2273e4dd92256bc9beb08b6a7dd3483a756
MD5 4a9f5c94b6cabcfc01822365c6b07ed7
BLAKE2b-256 45d15f702e8b9465aef2594bf14428a8606b677ccb670368f8aff928aa4c0fcb

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page