arkenar 1.0.0

modern vulnerability scanner combining Katana and Nuclei.
arkenar-1.0.0 is not a library.

Designed for pentesters and offensive security pros, Arkenar acts as a central orchestration layer. It combines Katana and Nuclei, while layering on its own custom mutation engine to catch complex logic flaws and injections that static templates might miss.

• Core Capabilities

Hybrid Engine: Seamlessly chains external tools (Katana, Nuclei) with native scanning logic for full-spectrum reconnaissance.

Smart Payload Injection: Uses a dynamic library of payloads for XSS, SQLi, and file exposure; actively mutates to bypass WAFs and filters.

Noise Reduction: Built-in response filtering cuts false positives for actionable results only.

Deep Configuration: Full control over threading, timeouts, and scan flags for specific rules.

Broad Coverage: Targets OWASP Top 10 and infrastructure misconfigurations. ​

Table of Contents


Preview

Installation (Recommended)

Windows

You can install Arkenar instantly using our automated PowerShell script. Copy and paste this command into your terminal:

iwr -useb https://raw.githubusercontent.com/realozk/ARKENAR/main/install.ps1 | iex

Linux & macOS

Run the following command to download and install automatically:

curl -sL https://raw.githubusercontent.com/realozk/ARKENAR/main/install.sh | bash


Usage

Running ARKENAR is simple. You can scan a single target or use a list of subdomains.

macOS & Linux

# Basic single target scan

arkenar [https://example.com](https://example.com)

# Advanced scan with a list and custom rate limit

arkenar -l subdomains.txt -o output.json --rate-limit 150

Windows (PowerShell / CMD)

# Basic single target scan

arkenar.exe [https://example.com](https://example.com)

# Advanced scan with a list and output file

arkenar.exe -l subdomains.txt -o results.json --rate-limit 150

Options

Flag Description Example
-l, --list Path to a file containing a list of subdomains -l ~/Desktop/targets.txt
-o, --output Save the scan results to a JSON file -o result.json
-t, --threads Set the number of concurrent threads (Default: 50) -t 100
--rate-limit Set the maximum requests per second --rate-limit 200
--timeout Connection timeout in seconds --timeout 10
-v, --verbose Enable verbose mode for detailed logs -v
--update Update ARKENAR and external tools (Katana/Nuclei) --update

Troubleshooting

Nuclei permission denied on macOS / Linux

If you see errors like permission denied when Nuclei tries to write its config files, fix the ownership of its config directories:

sudo chown -R $(whoami) ~/Library/Application\ Support/nuclei/

sudo chown -R $(whoami) ~/Library/Application\ Support/uncover/

or for more advanced scan

On Linux, the paths are typically:

sudo chown -R $(whoami) ~/.config/nuclei/

sudo chown -R $(whoami) ~/.config/uncover/

Self-update permission denied

If arkenar --update fails with Permission denied, the binary is in a protected directory. Re-run with:

sudo arkenar --update

Contributing

Contributions are welcome Please see the CONTRIBUTING.md file for details on how to get started.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Disclaimer

This tool is for educational and authorized testing purposes only. The developer is not responsible for any misuse or damage caused by this tool. Always obtain proper authorization before scanning any target.