Skip to main content

No project description provided

Project description

DUTVulnScanner - Cross-platform Vulnerability Scanner

🔍 A comprehensive, modular vulnerability scanning framework with support for multiple scanning tools and execution environments.

Features

  • Multiple Scanning Tools:
    • Recon: subfinder, naabu, httpx, nmap, whatweb, whois - Information gathering & discovery
    • Scanners: nuclei, testssl, sslscan, nikto - Vulnerability detection & SSL/TLS testing
    • Validators: dalfox, sqlmap, hydra - Vulnerability verification (opt-in)
  • Local Execution: Execute scans directly on your local machine
  • Smart Correlation: Automatically correlates findings from multiple tools
  • Multiple Report Formats: Generate reports in HTML, JSON, PDF, and SARIF
  • Customizable Profiles: Pre-configured scanning profiles for different scenarios
  • Modern CLI: Beautiful command-line interface built with Typer and Rich

Installation

🚀 Quick Install (Recommended for Kali Linux)

One-command installation:

# Install globally using pipx (recommended)
pipx install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git

# Or using pip
pip install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git

Note: If pipx is not installed:

sudo apt install pipx
pipx ensurepath
source ~/.bashrc

From Source (Development)

# Clone and install
git clone https://github.com/DinhManhAVG/CLI-Cross-Platform.git
cd CLI-Cross-Platform
pip install -e .

Verify Installation

dutVulnScanner --version
dutVulnScanner --help

📖 For detailed installation instructions, see INSTALL.md

Quick Start

Interactive Shell Mode (Recommended for beginners)

Start an interactive session where you can configure and run scans without typing dutVulnScanner every time:

dutVulnScanner shell

Inside the shell:

dutVulnScanner: help                           # Show all commands
dutVulnScanner: set target example.com         # Set your target
dutVulnScanner: set profile web                # Choose a profile
dutVulnScanner: show options                   # Review settings
dutVulnScanner: scan                           # Run the scan
dutVulnScanner: exit                           # Exit shell

Command-Line Mode

Choose Your Profile

List all available profiles to see which one fits your needs:

dutVulnScanner profile list

Common Usage Scenarios

Quick Security Check (~10 min)

dutVulnScanner scan run example.com --profile quick

Basic Reconnaissance (~30 min)

dutVulnScanner scan run example.com --profile recon

Complete Discovery Pipeline (~2 hours)

Subdomain enumeration → Port scanning → HTTP probing → Service detection

dutVulnScanner scan run example.com --profile discovery_full

Web Application Testing (~1 hour)

dutVulnScanner scan run https://example.com --profile web

Vulnerability Scanning (~3 hours)

dutVulnScanner scan run example.com --profile vuln_scan

Full Security Assessment (~6 hours)

dutVulnScanner scan run target.com --profile full_scan --output full_results.json

⚠️ Deep Testing (Authorization Required!)

# XSS, SQLi, brute-force testing - Only with written permission!
dutVulnScanner scan run target.com --profile deep_test

Generate Reports

dutVulnScanner report generate results.json report.html --format html

View Profile Details

dutVulnScanner profile show recon
dutVulnScanner profile show discovery_full

List Available Profiles

dutVulnScanner profile list

Architecture

dutVulnScanner/
├── cli/                # Command-line interface (Typer)
├── core/               # Core logic (orchestrator, config, schema, correlation)
├── runners/            # Local execution environment
├── plugins/            # Security scanning plugins
│   ├── recon/         # subfinder, naabu, httpx, nmap, whatweb, whois
│   ├── scanners/      # nuclei, testssl, sslscan, nikto
│   └── validators/    # dalfox, sqlmap, hydra
├── reporting/          # Report generation (builder, templates)
└── profiles/           # Scan profiles (recon, discovery_full, vuln_scan, deep_test)

Security Warning

Important: Always ensure you have authorization before scanning any target. Unauthorized scanning may be illegal.

Changelog

See CHANGELOG.md for a detailed list of changes and version history.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dutvulnscanner-0.1.4.tar.gz (44.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dutvulnscanner-0.1.4-py3-none-any.whl (71.7 kB view details)

Uploaded Python 3

File details

Details for the file dutvulnscanner-0.1.4.tar.gz.

File metadata

  • Download URL: dutvulnscanner-0.1.4.tar.gz
  • Upload date:
  • Size: 44.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.9

File hashes

Hashes for dutvulnscanner-0.1.4.tar.gz
Algorithm Hash digest
SHA256 9b60ee347782fd910b30e2037e5deed51cd03351d3aa0d6ac17c391dc7f6035b
MD5 58fd3b6fa3fc7220d882ae9a5ec1347e
BLAKE2b-256 1feb8bc4fa3d119ec1529595681e5570937f66c44932a7067e1dcae8fe2e17a7

See more details on using hashes here.

File details

Details for the file dutvulnscanner-0.1.4-py3-none-any.whl.

File metadata

  • Download URL: dutvulnscanner-0.1.4-py3-none-any.whl
  • Upload date:
  • Size: 71.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.9

File hashes

Hashes for dutvulnscanner-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 5aeb59a9958794539ac6da727779248828bebca8bb5a2e07dd8f21bd76a91277
MD5 ed9f8610a01904e9a93f5bd2a2bcafb7
BLAKE2b-256 9f21ac2427b865a8f8fbeb9051a913532f9a1a8f6024ceeb9dd14995bdf6a5c8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page