<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Kang Ali on Medium]]></title>
        <description><![CDATA[Stories by Kang Ali on Medium]]></description>
        <link>https://medium.com/@roomkangali?source=rss-0582cfedc610------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*5k5XXZntzugejN-b</url>
            <title>Stories by Kang Ali on Medium</title>
            <link>https://medium.com/@roomkangali?source=rss-0582cfedc610------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Thu, 09 Apr 2026 05:33:19 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@roomkangali/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Droid LLM Hunter]]></title>
            <link>https://medium.com/@roomkangali/droid-llm-hunter-2f94ead7f504?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/2f94ead7f504</guid>
            <category><![CDATA[vulnerability]]></category>
            <category><![CDATA[android]]></category>
            <category><![CDATA[generative-ai-tools]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Mon, 05 Jan 2026 06:22:21 GMT</pubDate>
            <atom:updated>2026-01-05T06:22:21.915Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>Droid LLM Hunter</strong> is an automated security analysis tool designed to detect vulnerabilities in Android applications with high precision. By combining traditional static analysis (SAST) with the contextual understanding of Large Language Models (LLMs), it bridges the gap between keyword-based scanning and human-like code review.</p><p>It supports <strong>Hybrid Decompilation</strong> (Smali/Java),<strong> Context-Aware Analysis</strong> (Call Graphs), and <strong>Intelligent Risk Filtering</strong>, ensuring that security engineers can focus on verified, high-severity findings rather than false positives.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*JRcI1M13tyX9OcH0.png" /></figure><h3>Features</h3><ul><li>🧠 Intelligent Analysis Engine: Droid LLM Hunter goes beyond regex. It breaks down code into chunks, summarizes functionality, and understands context before flagging vulnerabilities, significantly reducing false positives compared to traditional tools.</li><li>⭐ Staged Prompt Architecture: Uses a specialized pipeline of prompts (Summarization -&gt; Filtering -&gt; Deep Scan) to ensure consistent reasoning and reduce hallucination. <a href="https://github.com/roomkangali/droid-llm-hunter/blob/main/Prompt-Explanation.md">Read the Docs</a></li><li>🔍 Hybrid Filter Modes: Choose your strategy!</li><li>llm_only: Maximum accuracy using pure AI analysis.</li><li>static_only: Blazing fast keyword scanning.</li><li>hybrid: The best of both worlds Static keywords filter the noise, AI verifies the danger.</li><li>🛠️ Flexible Configuration: a simple yet powerful configuration file (config/settings.yaml) allows for easy management of LLM providers, models, rules, and Decompiler Settings (Apktool/JADX).</li><li>🕸️ Context-Aware Scanning: Utilizes a Call Graph to understand file dependencies. Use Cross-Reference Context to let the AI know <em>who</em> calls a function and with <em>what</em> arguments. <a href="https://github.com/roomkangali/droid-llm-hunter/blob/main/CROSS_REFERENCE_CONTEXT.md">Read the Docs</a></li><li>⚔️ Attack Surface Mapper: Combines Manifest Structure (Exported components) with Code Logic (AI Summaries) to identify high-risk entry points (e.g., specific activities processing unvalidated URLs). <a href="https://github.com/roomkangali/droid-llm-hunter/blob/main/Attack_Surface_Mapper.md">Read the Docs</a></li><li>📚 RAG with OWASP MASVS: Every finding is automatically enriched with the relevant OWASP Mobile Application Security Verification Standard (MASVS) ID (e.g., MASVS-STORAGE-1), making your reports audit-ready instantly.</li><li>🤖 Multi-Provider Support: Run locally with Ollama (free &amp; private) or scale up with Gemini, Groq, and OpenAI.</li><li>📊 Structured Security Reports: Get detailed JSON output containing severity, confidence scores, evidence snippets, and even an “Attack Surface Map” of the application.</li></ul><h3>Installation</h3><ol><li><strong>Clone the repository:</strong></li></ol><pre>git clone https://github.com/roomkangali/droid-llm-hunter.git <br>cd droid-llm-hunter</pre><p><strong>2. Create and activate a virtual environment:</strong></p><ul><li>Linux/macOS:</li></ul><pre>python3 -m venv venv<br>source venv/bin/activate</pre><ul><li>Windows</li></ul><pre>python -m venv venv<br>venv\\Scripts\\activate</pre><p><strong>3. Install dependencies:</strong></p><pre>pip install -r requirements.txt</pre><p><strong>4. Install Apktool &amp; JADX</strong></p><ul><li>Apktool (Required): Must be installed. <a href="https://apktool.org/docs/install">Instructions</a></li><li>JADX (Optional but Recommended): Required if you want to use jadx or hybrid decompiler modes. <a href="https://github.com/skylot/jadx">GitHub</a></li></ul><h3>🎬 Demo — Droid LLM Hunter</h3><p><a href="https://www.youtube.com/watch?v=VBNsb8ibK9Q">https://www.youtube.com/watch?v=VBNsb8ibK9Q</a></p><p><a href="https://www.youtube.com/watch?v=F9sDP9qO1o0">https://www.youtube.com/watch?v=F9sDP9qO1o0</a></p><h3>Repository Droid LLM Hunter</h3><p><a href="https://github.com/roomkangali/droid-llm-hunter">GitHub - roomkangali/droid-llm-hunter: Droid LLM Hunter is a tool to scan for vulnerabilities in Android applications using Large Language Models (LLMs).</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2f94ead7f504" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DursBurp — AI Extension for Burp Suite]]></title>
            <link>https://medium.com/@roomkangali/dursburp-ai-extension-for-burp-suite-1d370e98525d?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/1d370e98525d</guid>
            <category><![CDATA[burpsuite]]></category>
            <category><![CDATA[burpsuite-extension]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Fri, 10 Oct 2025 03:17:34 GMT</pubDate>
            <atom:updated>2025-10-10T03:17:34.916Z</atom:updated>
            <content:encoded><![CDATA[<h3>DursBurp — AI Extension for Burp Suite</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/595/0*F3zoZWE00y0K-qi1.png" /></figure><p>DursBurp is a Burp Suite extension that integrates the power of large language models (LLMs) from OpenAI, Google Gemini, and Groq to assist in security analysis. With DursBurp, you can send HTTP request/response pairs directly to an AI for in-depth vulnerability analysis, all within the Burp Suite interface.</p><h3>Features</h3><ul><li>On-Demand Analysis: Analyzes only the requests you choose, giving you full control.</li><li>Multi-API Support: Integrates with OpenAI, Google Gemini, and Groq APIs.</li><li>Structured Reports: Displays analysis results in a clean, tabbed format similar to the native Burp Scanner, with “Advisory,” “Request,” and “Response” tabs.</li><li>Customizable Prompts: Edit and save your own instruction prompts to tailor the AI’s analysis to your specific needs.</li><li>Finding Management: Mark findings as false positives with a green visual indicator.</li><li>Responsive UI: Analysis runs in the background to ensure the Burp Suite interface never freezes.</li></ul><h3>How It Works</h3><p>DursBurp works as an intelligent security assistant, not an automated scanner.</p><ol><li>Select a Target: Within Burp Suite (e.g., in Proxy &gt; HTTP history), right-click on a request/response pair you want to analyze.</li><li>Send for Analysis: Select “Extensions” &gt; “DursBurp” &gt; “Analyze with DursBurp”.</li><li>Prompt Generation: The extension takes the template from the “DursBurp” tab, filling in placeholders like {URL} and {REQUEST_BODY} with real data from your selected traffic.</li><li>AI Analysis: The completed prompt is sent to your configured AI service (OpenAI, Gemini, or Groq).</li><li>Report Generation: The AI analyzes the full context of the request and response and generates a structured vulnerability report.</li><li>View Results: The report is parsed and displayed cleanly in the results panel within the “DursBurp” tab, ready for your review.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9JyblHzy_dwMJ-LZ-5ytxQ.png" /></figure><p>Repo Github : <a href="https://github.com/roomkangali/DursBurp">https://github.com/roomkangali/DursBurp</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1d370e98525d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Dursgo v 1.1.0 : AI-Powered Analysis]]></title>
            <link>https://medium.com/@roomkangali/dursgo-v-1-1-0-ai-powered-analysis-9d0fbc607205?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/9d0fbc607205</guid>
            <category><![CDATA[vulnerability-scanning]]></category>
            <category><![CDATA[tools]]></category>
            <category><![CDATA[golang]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Mon, 01 Sep 2025 07:28:34 GMT</pubDate>
            <atom:updated>2025-09-01T07:28:34.626Z</atom:updated>
            <content:encoded><![CDATA[<h3>Dursgo v 1.1.0 : AI-Powered Analysis</h3><p><strong>Dursgo v1.1.0: AI-Powered Analysis</strong></p><p>Announce the release of Dursgo v1.1.0, a major leap forward that integrates the power of Large Language Models (LLMs) directly into your security scanning workflow.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*4K9BHDtc64y6gLRR.png" /></figure><p><a href="https://github.com/roomkangali/dursgo/releases/tag/1.1.0">https://github.com/roomkangali/dursgo/releases/tag/1.1.0</a></p><p>This release focuses on one key feature: AI-Powered Vulnerability Analysis, designed to transform how you understand and remediate vulnerabilities.</p><p><strong>✨ What’s New</strong></p><p><strong>🧠 AI-Powered Vulnerability Analysis</strong></p><p>Dursgo can now go beyond standard detection by providing deep, AI-generated insights for each vulnerability found.</p><p>- Root Cause Analysis: Get clear and concise explanations of why a vulnerability exists.<br>- Contextual Recommendations: Receive tailored remediation advice specific to the finding.<br>- Actionable Code Examples: Get practical code examples to help developers accelerate the fixing process.<br>- Multi-Provider Support: Seamlessly integrates with leading LLM providers. Current support includes:<br> — Google Gemini<br> — Groq (via its OpenAI-compatible API)<br> — Support for other providers like OpenAI will be added in the future.</p><p><strong>🚀 How to Use</strong></p><p>To activate this new feature, simply add the ` — enable-ai` flag to your scan command. Ensure you are also saving the output to a JSON file to see the results.</p><p>Example Command:<br><br>Run an SQLi scan and get AI-powered analysis for any findings</p><pre>./dursgo -u http://testphp.vulnweb.com/ -c 10 -r 3 -s sqli - enable-ai -output-json report.json</pre><p>📝 Configuration</p><p>The AI feature is configured via the new `ai` section in your `config.yaml` file.</p><pre># AI (LLM) Integration Settings<br>ai:<br> # Enable/disable the feature. Can be overridden by the - enable-ai flag.<br> enabled: true<br> <br> # The provider to use. Supported: &quot;gemini&quot;, &quot;groq&quot;<br> provider: &quot;groq&quot;<br> <br> # Your API key for the selected provider.<br> api_key: &quot;gsk_…&quot;<br> <br> # The specific model to use.<br> model: &quot;meta-llama/llama-4-scout-17b-16e-instruct&quot;</pre><p><strong>🛠️ Demo Video</strong></p><p><a href="https://www.youtube.com/watch?v=kpJS-C-ocLA">https://www.youtube.com/watch?v=kpJS-C-ocLA</a><br><a href="https://www.youtube.com/watch?v=n1YL1Kxq3Rc">https://www.youtube.com/watch?v=n1YL1Kxq3Rc</a></p><p><strong>Download DursGo</strong></p><p><a href="https://github.com/roomkangali/dursgo">https://github.com/roomkangali/dursgo</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9d0fbc607205" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[LabVulnerDursGo: A Hands-On Testing Ground for DursGo Scanner]]></title>
            <link>https://medium.com/@roomkangali/labvulnerdursgo-a-hands-on-testing-ground-for-dursgo-scanner-edb562f3c994?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/edb562f3c994</guid>
            <category><![CDATA[web-security]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Mon, 25 Aug 2025 02:54:24 GMT</pubDate>
            <atom:updated>2025-08-25T02:54:24.500Z</atom:updated>
            <content:encoded><![CDATA[<h3>Diving into LabVulnerDursGo: A Hands-On Testing Ground for DursGo Scanner</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*foUsQPd6JSQNsjQP.png" /></figure><h3>What Is LabVulnerDursGo?</h3><p>LabVulnerDursGo is a repository hosted on GitHub that provides a suite of deliberately vulnerable web applications. These labs are crafted to simulate real-world security flaws, allowing users to test DursGo’s capabilities in detecting issues like SQL Injection, XSS, and SSRF. Each lab comes with video walkthroughs demonstrating how to identify and solve the vulnerabilities using DursGo, making it an excellent learning resource for beginners and a validation tool for experts.</p><p>The labs are built using PHP, Python (Flask), and Node.js, and they can be run locally using Docker. This setup ensures accessibility and consistency across different environments. Whether you’re a pentester honing your skills or a developer validating security tools, LabVulnerDursGo is a valuable asset.</p><h3>Available Labs and Their Vulnerabilities</h3><p>The repository includes a diverse set of labs, each targeting specific vulnerability types. Here’s a breakdown:</p><ul><li><strong>Open Redirect Lab</strong>: Demonstrates a classic open redirect vulnerability where the app redirects to any user-supplied URL.</li><li><strong>Blind Vulnerabilities Lab</strong>: Features Blind SSRF and Blind Command Injection, detectable via OAST.</li><li><strong>SSRF (In-Band) Lab</strong>: A classic SSRF where the app fetches content from a user-supplied URL.</li><li><strong>Mass Assignment Lab</strong>: A protected API endpoint vulnerable to mass assignment attacks.</li><li><strong>CORS Misconfiguration Lab</strong>: An API endpoint that improperly reflects the Origin header, risking data theft.</li><li><strong>Authentication Lab</strong>: A login page to test authenticated scanning, with vulnerabilities like CSRF, BOLA, File Upload, and Mass Assignment.</li><li><strong>Exposed Files Lab</strong>: A directory to detect sensitive files and folders like .env or .git/.</li><li><strong>IDOR &amp; Stored XSS Lab</strong>: An authenticated test for Insecure Direct Object References and Stored XSS.</li><li><strong>GraphQL API Lab</strong>: A vulnerable GraphQL endpoint for testing introspection, injection, and other API flaws.</li></ul><p>These labs cover a wide range of OWASP Top 10 vulnerabilities, making them a comprehensive testing ground for DursGo’s scanner modules.</p><h3>Setting Up the Labs</h3><p>LabVulnerDursGo is designed for ease of use with Docker. It includes two main applications: a PHP-based dashboard (index-vuln) and a Python/Node.js-based service (index-vuln-2). Here’s how to get them running:</p><h3>1. PHP Lab Application (index-vuln)</h3><p>This serves as the main dashboard, linking to all labs, including those on ports 5000 and 4000.</p><ul><li><strong>Requirements</strong>: Docker, Docker Compose</li><li><strong>Steps</strong>:</li></ul><p>Navigate to the index-vuln directory:</p><pre>cd index-vuln</pre><p>Start the container:</p><pre>docker compose up --build -d</pre><p>Access the app at: <a href="http://localhost:8088/">http://localhost:8088</a></p><ul><li><strong>Stop</strong>:</li></ul><pre>docker compose down</pre><h3>2. Python &amp; Node.js Lab Application (index-vuln-2)</h3><p>This includes a Flask web app (port 5000) and a Node.js GraphQL API.</p><ul><li><strong>Requirements</strong>: Docker, Docker Compose</li><li><strong>Steps</strong>:</li></ul><p>Navigate to the index-vuln-2 directory:</p><pre>cd index-vuln-2</pre><p>Start both services:</p><pre>docker compose up --build -d</pre><p>Access the services (details on ports provided in the repo).</p><ul><li><strong>Credentials</strong> (for port 5000):</li><li>Admin: admin / admin123</li><li>Regular User: user1 / password123</li><li><strong>Stop</strong>:</li></ul><pre>docker compose down</pre><p><strong>Important</strong>: Run both applications simultaneously to ensure all links from the index-vuln dashboard work correctly.</p><h3>Why Use LabVulnerDursGo?</h3><p>This lab collection stands out for several reasons:</p><ul><li><strong>Practical Learning</strong>: Video walkthroughs provide step-by-step guidance, ideal for those new to pentesting.</li><li><strong>Comprehensive Testing</strong>: Covers multiple vulnerability types, validating DursGo’s broad scanner capabilities.</li><li><strong>Open-Source</strong>: Free to use and modify, fostering community contributions.</li><li><strong>Real-World Simulation</strong>: Mirrors common web app flaws, preparing you for actual security assessments.</li></ul><h3>Getting Started with DursGo and LabVulnerDursGo</h3><p>To make the most of this lab:</p><ol><li>Install DursGo from <a href="https://github.com/roomkangali/dursgo">its GitHub repository</a>.</li><li>Set up LabVulnerDursGo as described above.</li><li>Use DursGo’s CLI to scan the labs and compare results with the videos.</li><li>Experiment with flags like -oast for blind vulnerabilities.</li></ol><h3>Conclusion</h3><p>LabVulnerDursGo is companion to the DursGo scanner, offering a hands-on way to explore web security vulnerabilities. Whether you’re learning, testing, or contributing, this setup provides a safe and educational environment. <a href="https://github.com/roomkangali/LabVulnerDursGo">https://github.com/roomkangali/LabVulnerDursGo</a> for the latest updates.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=edb562f3c994" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DursGo — The Go-Powered Web Application Scanner]]></title>
            <link>https://medium.com/@roomkangali/dursgo-the-go-powered-web-application-scanner-174616a72f6c?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/174616a72f6c</guid>
            <category><![CDATA[tools]]></category>
            <category><![CDATA[golang]]></category>
            <category><![CDATA[vulnerability-scanning]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Mon, 25 Aug 2025 02:27:12 GMT</pubDate>
            <atom:updated>2025-08-25T02:27:12.654Z</atom:updated>
            <content:encoded><![CDATA[<h3>DursGo — The Go-Powered Web Application Scanner</h3><h3>DursGo: The Go-Powered Web Application Scanner for Cybersecurity</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*4K9BHDtc64y6gLRR.png" /></figure><h3>What Is DursGo?</h3><p>DursGo is a web application security scanner designed for penetration testing and automated security audits. Built with Go, it offers high performance and flexibility, making it ideal for quick scans without sacrificing accuracy. Unlike commercial scanners, DursGo is open-source and free under the MIT License, allowing you to customize it to your needs.</p><p>The tool supports scanning modern web applications, including JavaScript-based Single-Page Applications (SPAs), and integrates with Out-of-Band Application Security Testing (OAST) services like Interactsh. It also enriches findings with data from the CISA Known Exploited Vulnerabilities (KEV) catalog, helping you prioritize real-world exploited vulnerabilities.</p><p>Additionally, there’s a supporting repository called <strong>LabVulnerDursGo</strong>, which includes vulnerable applications for testing DursGo, complete with video walkthroughs. This is a fantastic resource for beginners looking to learn through hands-on practice.</p><h3>Features of DursGo</h3><p>DursGo stands out with its context-aware and intelligent approach. Here are its key features:</p><ul><li><strong>Intelligent, Context-Aware Scanning</strong>: Detects a wide range of vulnerabilities with high accuracy, tailoring logic to contexts like HTML or JavaScript.</li><li><strong>Comprehensive Authentication Support</strong>: Scans applications protected by login forms, bearer tokens, or session cookies.</li><li><strong>In-Depth Automated Discovery</strong>: Crawls web apps thoroughly, including SPAs and API endpoints, with JavaScript rendering via a headless browser (Chrome/Chromium).</li><li><strong>Accurate Finding Deduplication</strong>: Normalizes and removes duplicate findings for clean reports.</li><li><strong>OAST Integration</strong>: Detects blind vulnerabilities like SSRF through out-of-band verification.</li><li><strong>KEV Enrichment</strong>: Adds context from the CISA KEV catalog to findings.</li><li><strong>Flexible Configuration</strong>: Customizable via YAML files and CLI flags.</li><li><strong>High-Performance Engine</strong>: Lightweight and fast, leveraging Go’s concurrency.</li></ul><p>DursGo also prioritizes reducing false positives with baseline comparison logic, such as in its IDOR and SQLi scanners.</p><h3>Scan Workflow</h3><p>DursGo follows a systematic, multi-stage workflow for comprehensive coverage:</p><ol><li><strong>Technology Fingerprinting</strong>: Identifies the target’s technologies (e.g., WordPress, Laravel) to tailor scan modules.</li><li><strong>Intelligent Crawling</strong>: Discovers URLs, forms, and endpoints, with the -render-js option for SPAs.</li><li><strong>Proactive Parameter Discovery</strong>: Injects common parameter names to uncover hidden vulnerabilities.</li><li><strong>Scanner Execution</strong>: Runs selected modules (e.g., XSS, SQLi) concurrently against discovered targets.</li><li><strong>OAST Verification</strong>: Checks out-of-band interactions if enabled.</li><li><strong>Deduplication &amp; Reporting</strong>: Aggregates unique findings and generates console or JSON output.</li></ol><p><strong>Note</strong>: Scans with -s all can take longer due to the multiplicative effect (URLs x Parameters x Payloads x Scanners). For speed, target specific scanners instead.</p><h3>Installing DursGo</h3><p>Installation is straightforward but requires Go version 1.23 or newer.</p><p><strong>Clone the Repository</strong>:</p><pre>git clone https://github.com/roomkangali/dursgo.git<br>cd dursgo</pre><p><strong>Build the Application</strong>:</p><pre>go build -o dursgo ./cmd/dursgo</pre><p><strong>Copy to PATH (Optional)</strong>:</p><pre>sudo cp dursgo /usr/local/bin/</pre><p>For JavaScript rendering or DOM XSS features, install Chrome/Chromium:</p><ul><li>Ubuntu: sudo apt-get install -y chromium-browser</li><li>macOS: brew install --cask google-chrome</li></ul><p>Initial configuration uses a config.yaml file in the working directory for target and authentication settings.</p><h3>Basic Usage and Examples</h3><p>Start with a simple command:</p><ul><li><strong>Basic Scan</strong>:</li></ul><pre>./dursgo -u http://example.com -c 10 -r 3 -s xss,sqli</pre><ul><li><strong>Scan with OAST</strong>:</li></ul><pre>./dursgo -u http://example.com -c 10 -r 3 -s blindssrf --oast</pre><ul><li><strong>Scan DOM XSS with JavaScript Rendering</strong>:</li></ul><pre>./dursgo -u http://spa.example.com -c 10 -r 3 -s domxss -render-js</pre><p>Full CLI options include -d (crawl depth), -delay (request delay), -enrich (KEV enrichment), and -output-json (JSON report).</p><h3>Available Scanners</h3><p>DursGo offers a variety of scanner modules, runnable with -s (e.g., -s xss,sqli or -s all):</p><ul><li>blindssrf: Blind SSRF (requires -oast).</li><li>cmdinjection: Command Injection (supports OAST).</li><li>domxss: DOM-Based XSS (requires -render-js).</li><li>bola: Broken Object Level Authorization.</li><li>cors: CORS misconfigurations.</li><li>csrf: Cross-Site Request Forgery.</li><li>exposed: Exposed files/directories.</li><li>fileupload: Unrestricted File Upload.</li><li>graphql: GraphQL vulnerabilities (introspection, injection).</li><li>idor: Insecure Direct Object Reference.</li><li>lfi: Local File Inclusion.</li><li>massassignment: Mass Assignment.</li><li>openredirect: Open Redirect.</li><li>securityheaders: Missing security headers.</li><li>sqli: SQL Injection.</li><li>ssrf: In-band SSRF.</li><li>ssti: Server-Side Template Injection.</li><li>xss: Combines Reflected and Stored XSS.</li></ul><p>Use none for crawling only, without vulnerability scanning.</p><h3>Configuration File (config.yaml)</h3><p>Use YAML for complex settings, such as authentication:</p><ul><li><strong>General</strong>: Target, concurrency, scanners, etc.</li><li><strong>Output</strong>: Verbose, format (JSON), output file.</li><li><strong>Authentication</strong>: Supports form-based, cookie, header (Bearer), or auth-token.</li></ul><p>Example form-based authentication:</p><pre>authentication:<br>  enabled: true<br>  type: &quot;header&quot;<br>  header_name: &quot;X-Auth-Token&quot;<br>  value: &quot;eyJhbGciOiJIUzI1Ni...[token]&quot;</pre><p>For IDOR, specify scan_idor with the authenticated user ID.</p><h3>JSON Report Structure</h3><p>The JSON report includes:</p><ul><li>scan_summary: Scan metadata (duration, scanners, technologies).</li><li>discovered_endpoints: List of URLs and parameters.</li><li>vulnerabilities: Detailed vulnerability data (type, URL, severity, remediation).</li></ul><p>This format is ideal for CI/CD integration or security dashboards.</p><h3>Development Roadmap</h3><p>DursGo is an evolving project. Current priorities include:</p><ul><li><strong>IDOR Scanner</strong>: Add parameter-based support and non-numeric IDs (UUIDs).</li><li><strong>Enhancements</strong>: OpenAPI support, JWT attacks, OAuth misconfigs, HTTP smuggling, etc.</li><li><strong>New Scanners</strong>: XXE, Deserialization, Prototype Pollution, Secret Scanning.</li><li><strong>Reporting</strong>: HTML/CSV output, evidence snippets.</li><li><strong>Integration</strong>: Baseline scans for CI/CD, a web dashboard with LLM AI for analysis.</li></ul><h3>Conclusion</h3><p>DursGo is a powerful tool for anyone serious about web security. With Go’s performance and advanced features like OAST and KEV enrichment, it’s a free alternative to commercial scanners. However, remember: Use it only for authorized testing, as responsibility lies with the user.</p><p>If you try DursGo, share your experience in the comments! Check the GitHub repository for the latest updates: <a href="https://github.com/roomkangali/dursgo">https://github.com/roomkangali/dursgo</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=174616a72f6c" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DursVulnNSE Database Update Explanation]]></title>
            <link>https://medium.com/@roomkangali/dursvulnnse-database-update-explanation-af80d1c8e713?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/af80d1c8e713</guid>
            <category><![CDATA[vulnerability-scanning]]></category>
            <category><![CDATA[vulnerability-assessment]]></category>
            <category><![CDATA[nmap]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[tools]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Tue, 22 Jul 2025 15:20:47 GMT</pubDate>
            <atom:updated>2025-07-22T15:20:47.864Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/741/1*K9PiGppZjsyAFGysTJgtVw.png" /></figure><p>Community-driven database for the DursVulnNSE project. Its core purpose is to decouple raw data sources from the final, distributable database used by the scanner. This separation allows for easy community contributions and provides a single, optimized database file for DursVulnNSE scanner users.</p><p>The primary artifacts of this repository are the comprehensive and up-to-date vulnerability database files: cve-main.json, product.json, and script_mapping.json. End-users of the DursVulnNSE scanner can simply download these files to replace existing ones within the database/ directory of a standard DursVulnNSE installation.</p><h3>System Architecture: Contribution, Curation, and Distribution</h3><p>This repository employs a two-phase workflow: <strong>Contribution &amp; Curation</strong> and <strong>Distribution</strong>, ensuring both ease of contribution and optimized delivery for scanner users.</p><h3>Phase 1: Contribution &amp; Curation</h3><p>This is where all additions and updates to the vulnerability data happen. Contributors work with small, manageable JSON files, organized intuitively by category.</p><ul><li>product.json acts as the source of truth, dictating which products are actively tracked for vulnerabilities.</li><li>The tools/db_updater.py script reads this configuration, intelligently fetches the latest CVEs from the NVD API, and updates the corresponding small, topic-specific JSON files located within the cves/ directory.</li><li>This modular approach makes it incredibly easy for users to add new CVEs or update existing ones by simply editing these topic-specific files, drastically reducing the potential for merge conflicts.</li></ul><h3>Phase 2: Distribution</h3><p>This phase is dedicated to producing the final, optimized database file that the DursVulnNSE scanner directly consumes.</p><ul><li>The tools/merger.py script is executed. It intelligently traverses all the small JSON files across the cves/ directory.</li><li>It then de-duplicates, sorts, and merges all the individual entries into a single, large, and highly optimized cve-main.json file.</li><li>cve-main.json is the ultimate artifact that DursVulnNSE scanner end-users need to download for their operations.</li></ul><h3>Key Features</h3><ul><li><strong>Modular &amp; Scalable</strong>: The database is intelligently split into small, category-based files, making it easy to manage and scale.</li><li><strong>Contributor-Friendly</strong>: This architecture drastically reduces merge conflicts and simplifies the process of adding new vulnerabilities, encouraging community participation.</li><li><strong>Automated Tools</strong>: The repository provides robust Python scripts to fetch, update, and merge CVE data efficiently.</li><li><strong>Decoupled Architecture</strong>: It clearly separates the database management workflow from the scanner’s operational logic, promoting cleaner development and maintenance.</li></ul><h3>Directory Structure</h3><p>To give you a clearer picture of how the data is organized:</p><pre>Repo-Database/<br>│<br>├── cves/<br>│   ├── ad/<br>│   ├── database/<br>│   ├── http/<br>│   └── ... (other categories)<br>│<br>├── tools/<br>│   ├── db_updater.py<br>│   └── merger.py<br>│   └── version_refactor.py<br>│<br>├── cve-main.json<br>├── product.json<br>└── script_mapping.json</pre><h3>Database Management Tools</h3><p>This repository contains three primary Python scripts, all conveniently located in the tools/ directory, to streamline database management:</p><h3>db_updater.py</h3><p>This script is used to populate individual CVE files. It reads the product.json configuration to identify which products need updates, then fetches the latest CVE data from the NVD API. The fetched data is used to update corresponding JSON files within the Repo-Database/cves/ directory. Any CVEs that do not match a specific product are intelligently added to Repo-Database/cves/misc/others.json.</p><h3>merger.py</h3><p>This powerful script consolidates all individual CVE files into the final, comprehensive database (cve-main.json). It recursively scans the cves/ directory, efficiently handles empty files, de-duplicates entries by CVE ID, and sorts the final list for optimal scanner performance.</p><h3>version_refactor.py</h3><p>Designed to standardize and improve the accuracy of version_match fields within existing CVE entries across the database. It transforms flat lists of version conditions into a more structured, grouped format, which significantly enhances the precision of vulnerability matching performed by the DursVulnNSE scanner.</p><h3>Configuration Files</h3><p>The root directory houses the primary configuration files that orchestrate the database generation tools:</p><h3>product.json</h3><p>This is the central configuration file for the db_updater.py script. It meticulously defines which products to track and provides instructions on how to find their associated CVEs.</p><h3>script_mapping.json</h3><p>This file serves a crucial role by mapping critical CVEs to specific Nmap scripts that can be utilized for active verification, adding another layer of validation to the scanning process.</p><h3>DursVuln Database Update — Video Explanation</h3><p><a href="https://www.youtube.com/watch?v=FTwnjzAHzaI">https://www.youtube.com/watch?v=FTwnjzAHzaI</a></p><p>To provide a comprehensive understanding of the database update process, I have created a detailed video explanation. The video covers the following steps and important details:</p><p><strong>Initial Preparation:</strong> Before starting the update process, ensure the following files are correct and add any new entries if necessary:</p><ol><li>cve-main.json: Verify its structure and content are accurate.</li><li>script_mapping.json: Confirm the mapping of Nmap scripts to CVEs.</li><li>product.json: Ensure the list of tracked products is complete and accurate.</li></ol><p><strong>Database Update Steps:</strong></p><p>The video meticulously explains the execution order of the scripts required to update the database:</p><p><strong>Step 1: </strong><strong>python3 Repo-Database/tools/db_updater.py</strong></p><ul><li>This script reads product.json to identify products requiring updates.</li><li>It then fetches the latest CVE data from the NVD API.</li><li>The fetched data updates individual JSON files in Repo-Database/cves/. Unmatched CVEs are added to Repo-Database/cves/misc/others.json.</li></ul><p><strong>Step 2: </strong><strong>python3 Repo-Database/tools/version_refactor.py</strong></p><ul><li>Executed after db_updater.py, this script standardizes the version_match format across all CVE entries. This grouping improves the accuracy of vulnerability matching by the DursVulnNSE scanner.</li></ul><p><strong>Step 3: </strong><strong>python3 Repo-Database/tools/merger.py</strong></p><ul><li>The final step: merger.py recursively scans all JSON files in Repo-Database/cves/.</li><li>It de-duplicates entries by CVE ID, sorts the final list, and merges all data into a single, comprehensive Repo-Database/cve-main.json file, ready for the DursVulnNSE scanner.</li></ul><p>This video provides a visual and step-by-step guide to ensure you can update the DursVuln database correctly and efficiently.</p><p>DursVuln Database is more than just a collection of files; it’s a robust, community-driven system designed to provide accurate, up-to-date, and customizable vulnerability intelligence for the DursVulnNSE scanner.</p><p><strong>Check out the DursVuln-Database GitHub repository to learn more and contribute:</strong> <a href="https://github.com/roomkangali/DursVuln-Database">https://github.com/roomkangali/DursVuln-Database</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=af80d1c8e713" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DursVulnNSE: Modern NSE-Nmap]]></title>
            <link>https://medium.com/@roomkangali/dursvulnnse-modern-nse-nmap-3044b27797e2?source=rss-0582cfedc610------2</link>
            <guid isPermaLink="false">https://medium.com/p/3044b27797e2</guid>
            <category><![CDATA[nmap]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[tools]]></category>
            <category><![CDATA[vulnerability-scanning]]></category>
            <category><![CDATA[vulnerability-assessment]]></category>
            <dc:creator><![CDATA[Kang Ali]]></dc:creator>
            <pubDate>Tue, 15 Jul 2025 13:06:15 GMT</pubDate>
            <atom:updated>2025-07-16T01:32:59.867Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/741/1*K9PiGppZjsyAFGysTJgtVw.png" /></figure><p>Inspired by projects like scipag/vulscan and vulnersCom/nmap-vulners, DursVulnNSE is an open-source Nmap Scripting Engine script meticulously designed to identify vulnerabilities in detected services. It boasts a modular architecture and an easily updatable local database, providing detailed, and highly readable vulnerability reports.</p><h3>Why DursVuln Stands Out</h3><p>DursVulnNSE addresses critical gaps in the Nmap ecosystem, offering a flexible and user-friendly solution for local vulnerability scanning. It tackles common challenges such as false positives and delayed updates often associated with online or less customizable tools.</p><p>DursVulnNSE is ideal for:</p><ul><li><strong>Internal Penetration Testing:</strong> Conduct thorough scans within your private networks.</li><li><strong>Air-Gapped Environments:</strong> Perform vulnerability assessments without relying on external internet access.</li><li><strong>Privacy-Focused Operations:</strong> Keep your vulnerability data local and secure.</li></ul><h3>A Glimpse into DursVuln’s Architecture</h3><p>DursVulnNSE operates on a two-component architecture, ensuring maximum efficiency:</p><ol><li><strong>Offline Processing Component (</strong><strong>db_updater.py):</strong> This Python script handles all resource-intensive tasks. It reads configuration files (product.json and script_mapping.json), fetches raw CVE data from the NVD API, and enriches it. The output is a structured and optimized cve-main.json file, ready for rapid scanning.</li><li><strong>Scan-Time Execution Component (</strong><strong>dursvuln.nse &amp; </strong><strong>vulndb.lua):</strong> Designed to be lightweight and fast, this component loads the pre-processed cve-main.json data into memory during an Nmap scan. It efficiently matches vulnerabilities against targets, applies filtering logic, and presents a concise report without heavy data processing.</li></ol><p>A unique capability is its <strong>Layered Application Detection</strong>, allowing it to “look deeper” than just web server versions. For instance, it can detect actual application versions like Jenkins running on Jetty by analyzing HTTP headers or HTML content.</p><h3>Video Demonstrations</h3><p>See DursVulnNSE in action with these detailed demonstrations:</p><h3>1. Install DursVulnNSE and Demo Vulhub Lab</h3><p><strong>Video Link:</strong></p><p><a href="https://www.youtube.com/watch?v=A6_YR7VMzWk">https://www.youtube.com/watch?v=A6_YR7VMzWk</a></p><p>In this video, we’ll demonstrate DursVulnNSE, an open-source Nmap Scripting Engine (NSE) script for local vulnerability scanning. We’ll use it inside a Vulhub lab to quickly and efficiently identify three critical vulnerabilities.</p><p><strong>VULNERABILITY SCENARIOS DEMONSTRATED:</strong></p><ul><li><strong>Jenkins RCE (CVE-2017–1000353):</strong> Finding a Remote Code Execution vulnerability in Jenkins CI.</li><li><strong>Nginx Cache Leak (CVE-2017–7529):</strong> Identifying an information leak from the Nginx cache due to an integer overflow.</li><li><strong>PostgreSQL RCE (CVE-2019–9193):</strong> Detecting a vulnerability that allows for arbitrary command execution with admin privileges in PostgreSQL.</li></ul><h3>Key Features at a Glance</h3><ul><li><strong>Dynamic Service Detection:</strong> Automatically scans any open port where Nmap detects a service and its version.</li><li><strong>Output Control:</strong> Customize report verbosity with dursvuln.output (e.g., concise for summarized reports or full for all technical details).</li><li><strong>Severity Filtering:</strong> Filter results based on minimum severity levels (LOW, MEDIUM, HIGH, CRITICAL).</li><li><strong>Database Updater:</strong> Python scripts (db_updater.py, fix_duplicate.py) ensure your CVE data is always up-to-date and free of duplicates.</li><li><strong>Layered Application Detection:</strong> Beyond basic service versions, it identifies application versions from HTTP headers or HTML content.</li></ul><h3>User Group</h3><p>DursVulnNSE is built to solve real problems for various user groups:</p><ul><li><strong>Red/Blue Teams:</strong> Perfect for internal/air-gapped networks, project-specific rule customization, and adding non-public vulnerabilities.</li><li><strong>Bug Hunters:</strong> Offers efficiency in identifying vulnerabilities and managing personal findings.</li><li><strong>Cybersecurity Trainers:</strong> Provides an excellent learning environment and educational tool for understanding vulnerability scanning.</li></ul><h3>Getting Started with DursVulnNSE</h3><p><strong>Installation:</strong> Ensure Nmap version 7.94SVN or later is installed.</p><pre>git clone https://github.com/roomkangali/DursVulnNSE<br>cd DursVulnNSE</pre><p><strong>Update Database:</strong></p><pre>pip install requests<br>python3 tools/db_updater.py</pre><p><strong>Running a Scan (Local Development):</strong></p><pre>sudo nmap -sV -Pn --script ./dursvuln.nse &lt;target_ip&gt;</pre><p>For automated global installation, use the configure-dursvuln.sh script.</p><h3>Understanding Your Report</h3><p>DursVulnNSE classifies findings based on confidence:</p><ul><li><strong>ID: … (High Confidence):</strong> Strong evidence, target version matches a known vulnerable range. High Priority.</li><li><strong>… (Active Check Required): …:</strong> Critical potential risk, provides another Nmap command for verification. Urgent Priority.</li><li><strong>POTENTIAL (Low Confidence): …:</strong> Weak evidence, requires manual verification. Low Priority.</li></ul><h3>Customize and Contribute!</h3><p>The DursVuln lies in its flexibility. You can easily add new products, aliases, advanced detection rules, and active test mappings by modifying product.json and script_mapping.json. After changes, simply re-run db_updater.py.</p><p>Contributions are highly welcome! Whether it’s for scanner issues/features or database contributions, your input helps DursVulnNSE grow.</p><p>DursVulnNSE is more than just an Nmap script; it’s a comprehensive, customizable, and efficient solution for vulnerability scanning, designed to cybersecurity professionals and enthusiasts alike.</p><p><strong>Check out the DursVulnNSE GitHub repository </strong><a href="https://github.com/roomkangali/DursVulnNSE">https://github.com/roomkangali/DursVulnNSE</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3044b27797e2" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>