Skip to main content

No project description provided

Project description

DUTVulnScanner - Cross-platform Vulnerability Scanner

🔍 A comprehensive, modular vulnerability scanning framework with support for multiple scanning tools and execution environments.

Features

  • Multiple Scanning Tools:
    • Recon: subfinder, naabu, httpx, nmap, whatweb, whois - Information gathering & discovery
    • Scanners: nuclei, testssl, sslscan, nikto - Vulnerability detection & SSL/TLS testing
    • Validators: dalfox, sqlmap, hydra - Vulnerability verification (opt-in)
  • Local Execution: Execute scans directly on your local machine
  • Smart Correlation: Automatically correlates findings from multiple tools
  • Multiple Report Formats: Generate reports in HTML, JSON, PDF, and SARIF
  • Customizable Profiles: Pre-configured scanning profiles for different scenarios
  • Modern CLI: Beautiful command-line interface built with Typer and Rich

Installation

🚀 Quick Install (Recommended for Kali Linux)

One-command installation:

# Install globally using pipx (recommended)
pipx install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git

# Or using pip
pip install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git

Note: If pipx is not installed:

sudo apt install pipx
pipx ensurepath
source ~/.bashrc

From Source (Development)

# Clone and install
git clone https://github.com/DinhManhAVG/CLI-Cross-Platform.git
cd CLI-Cross-Platform
pip install -e .

Verify Installation

dutVulnScanner --version
dutVulnScanner --help

📖 For detailed installation instructions, see INSTALL.md

Quick Start

Interactive Shell Mode (Recommended for beginners)

Start an interactive session where you can configure and run scans without typing dutVulnScanner every time:

dutVulnScanner shell

Inside the shell:

dutVulnScanner: help                           # Show all commands
dutVulnScanner: set target example.com         # Set your target
dutVulnScanner: set profile web                # Choose a profile
dutVulnScanner: show options                   # Review settings
dutVulnScanner: scan                           # Run the scan
dutVulnScanner: exit                           # Exit shell

Command-Line Mode

Choose Your Profile

List all available profiles to see which one fits your needs:

dutVulnScanner profile list

Common Usage Scenarios

Quick Security Check (~10 min)

dutVulnScanner scan run example.com --profile quick

Basic Reconnaissance (~30 min)

dutVulnScanner scan run example.com --profile recon

Complete Discovery Pipeline (~2 hours)

Subdomain enumeration → Port scanning → HTTP probing → Service detection

dutVulnScanner scan run example.com --profile discovery_full

Web Application Testing (~1 hour)

dutVulnScanner scan run https://example.com --profile web

Vulnerability Scanning (~3 hours)

dutVulnScanner scan run example.com --profile vuln_scan

Full Security Assessment (~6 hours)

dutVulnScanner scan run target.com --profile full_scan --output full_results.json

⚠️ Deep Testing (Authorization Required!)

# XSS, SQLi, brute-force testing - Only with written permission!
dutVulnScanner scan run target.com --profile deep_test

Generate Reports

dutVulnScanner report generate results.json report.html --format html

View Profile Details

dutVulnScanner profile show recon
dutVulnScanner profile show discovery_full

List Available Profiles

dutVulnScanner profile list

Architecture

dutVulnScanner/
├── cli/                # Command-line interface (Typer)
├── core/               # Core logic (orchestrator, config, schema, correlation)
├── runners/            # Local execution environment
├── plugins/            # Security scanning plugins
│   ├── recon/         # subfinder, naabu, httpx, nmap, whatweb, whois
│   ├── scanners/      # nuclei, testssl, sslscan, nikto
│   └── validators/    # dalfox, sqlmap, hydra
├── reporting/          # Report generation (builder, templates)
└── profiles/           # Scan profiles (recon, discovery_full, vuln_scan, deep_test)

Security Warning

Important: Always ensure you have authorization before scanning any target. Unauthorized scanning may be illegal.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dutvulnscanner-0.1.2.tar.gz (44.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dutvulnscanner-0.1.2-py3-none-any.whl (71.7 kB view details)

Uploaded Python 3

File details

Details for the file dutvulnscanner-0.1.2.tar.gz.

File metadata

  • Download URL: dutvulnscanner-0.1.2.tar.gz
  • Upload date:
  • Size: 44.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.9

File hashes

Hashes for dutvulnscanner-0.1.2.tar.gz
Algorithm Hash digest
SHA256 e9bed2179efbd253716c41ac6901f401d580cf2a51834e5879c4a8097ee7a99b
MD5 81038675f7872ab560d607b31363167e
BLAKE2b-256 03b5675624ebe9071fad1e744c76efcc503ea27093171d6a6147b7371d1686da

See more details on using hashes here.

File details

Details for the file dutvulnscanner-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: dutvulnscanner-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 71.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.9

File hashes

Hashes for dutvulnscanner-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 6c1a7b5ffd3fd13ea47d0132509b7823ff18f407698855f5f76b7e584f205180
MD5 395352737571171cb859be348fe76544
BLAKE2b-256 7853ebedef1cc7ed14059a03f070e7802fec25c66860fa4e310afe2411735993

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page