DUT Vulnerability Scanner - A comprehensive security scanning tool with plugin-based architecture
Project description
DUTVulnScanner - Cross-platform Vulnerability Scanner
🔍 A comprehensive, modular vulnerability scanning framework with support for multiple scanning tools and execution environments.
Features
- Multiple Scanning Tools:
- Recon: subfinder, naabu, httpx, nmap, whatweb, whois - Information gathering & discovery
- Scanners: nuclei, testssl, sslscan, nikto - Vulnerability detection & SSL/TLS testing
- Validators: dalfox, sqlmap, hydra - Vulnerability verification (opt-in)
- Local Execution: Execute scans directly on your local machine
- Smart Correlation: Automatically correlates findings from multiple tools
- ** AI-Powered Analysis**: Generate intelligent summaries using Google Gemini
- ** Professional PDF Reports**: Export comprehensive reports with color-coded findings
- Multiple Report Formats: Generate reports in HTML, JSON, PDF, and SARIF
- Customizable Profiles: Pre-configured scanning profiles for different scenarios
- Modern CLI: Beautiful command-line interface built with Typer and Rich
Installation
🚀 Quick Install (Recommended for Kali Linux)
One-command installation:
# Install globally using pipx (recommended)
pipx install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git
# Or using pip
pip install git+https://github.com/DinhManhAVG/CLI-Cross-Platform.git
Note: If pipx is not installed:
sudo apt install pipx
pipx ensurepath
source ~/.bashrc
From Source (Development)
# Clone and install
git clone https://github.com/DinhManhAVG/CLI-Cross-Platform.git
cd CLI-Cross-Platform
pip install -e .
Verify Installation
dutVulnScanner --version
dutVulnScanner --help
📖 For detailed installation instructions, see INSTALL.md
Quick Start
Interactive Shell Mode (Recommended for beginners)
Start an interactive session where you can configure and run scans without typing dutVulnScanner every time:
dutVulnScanner shell
Inside the shell:
dutVulnScanner: help # Show all commands
dutVulnScanner: set target example.com # Set your target
dutVulnScanner: set profile web # Choose a profile
dutVulnScanner: show options # Review settings
dutVulnScanner: scan # Run the scan
dutVulnScanner: exit # Exit shell
Command-Line Mode
Choose Your Profile
List all available profiles to see which one fits your needs:
dutVulnScanner profile list
Common Usage Scenarios
Quick Security Check (~10 min)
dutVulnScanner scan run example.com --profile quick
Basic Reconnaissance (~30 min)
dutVulnScanner scan run example.com --profile recon
Complete Discovery Pipeline (~2 hours)
Subdomain enumeration → Port scanning → HTTP probing → Service detection
dutVulnScanner scan run example.com --profile discovery_full
Web Application Testing (~1 hour)
dutVulnScanner scan run https://example.com --profile web
Vulnerability Scanning (~3 hours)
dutVulnScanner scan run example.com --profile vuln_scan
Full Security Assessment (~6 hours)
dutVulnScanner scan run target.com --profile full_scan --output full_results.json
⚠️ Deep Testing (Authorization Required!)
# XSS, SQLi, brute-force testing - Only with written permission!
dutVulnScanner scan run target.com --profile deep_test
AI-Powered PDF Reports (NEW)
Generate professional PDF reports with AI-powered analysis:
Setup
- Get a free API key from Google AI Studio
- Create
.envfile in project root:
GEMINI_API_KEY=your_api_key_here
Generate AI Report
dutVulnScanner scan run example.com \
--profile quick \
--output-dir ./scan_results \
--generate-report
This creates:
- JSON results:
scan_results/scan_*/scan_manifest.json - PDF report:
scan_results/scan_*/report.pdfwith:- Executive summary with AI insights
- Vulnerability statistics dashboard
- Prioritized remediation recommendations
- Detailed findings organized by severity
- Technical scan details
Short flag: Use -r instead of --generate-report
Generate Reports
dutVulnScanner report generate results.json report.html --format html
View Profile Details
dutVulnScanner profile show recon
dutVulnScanner profile show discovery_full
List Available Profiles
dutVulnScanner profile list
Architecture
dutVulnScanner/
├── cli/ # Command-line interface (Typer)
├── core/ # Core logic (orchestrator, config, schema, correlation)
├── runners/ # Local execution environment
├── plugins/ # Security scanning plugins
│ ├── recon/ # subfinder, naabu, httpx, nmap, whatweb, whois
│ ├── scanners/ # nuclei, testssl, sslscan, nikto
│ └── validators/ # dalfox, sqlmap, hydra
├── reporting/ # Report generation (builder, templates)
└── profiles/ # Scan profiles (recon, discovery_full, vuln_scan, deep_test)
Security Warning
Important: Always ensure you have authorization before scanning any target. Unauthorized scanning may be illegal.
Changelog
See CHANGELOG.md for a detailed list of changes and version history.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file dutvulnscanner-0.3.0.tar.gz.
File metadata
- Download URL: dutvulnscanner-0.3.0.tar.gz
- Upload date:
- Size: 122.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7e9a81856f8db640bb15f2d3a631dbcfba5cdfa63d43d2b9bdbbe46d5db92459
|
|
| MD5 |
6eba95dcad9f916d1615a43bded98055
|
|
| BLAKE2b-256 |
f6e4be235278f96c32db099069c8b8cdcd4395cb3a7bc09bb79ccef3dfaf0389
|
File details
Details for the file dutvulnscanner-0.3.0-py3-none-any.whl.
File metadata
- Download URL: dutvulnscanner-0.3.0-py3-none-any.whl
- Upload date:
- Size: 154.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c8c92b593006bfea4bce23f0ce28c86210f23bdcb62577ddd9b8676766d27730
|
|
| MD5 |
c59d8a2a917591c60c452e794ec08a93
|
|
| BLAKE2b-256 |
d6f4e09aad7a6133de52b0e1ab00fe2e9017ef4a8930b198404f8003c6a1e956
|