Designed for pentesters and offensive security pros, Arkenar acts as a central orchestration layer. It combines Katana and Nuclei, while layering on its own custom mutation engine to catch complex logic flaws and injections that static templates might miss.
• Core Capabilities
• Hybrid Engine: Seamlessly chains external tools (Katana, Nuclei) with native scanning logic for full-spectrum reconnaissance.
• Smart Payload Injection: Uses a dynamic library of payloads for XSS, SQLi, and file exposure; actively mutates to bypass WAFs and filters.
• Noise Reduction: Built-in response filtering cuts false positives for actionable results only.
•Deep Configuration: Full control over threading, timeouts, and scan flags for specific rules.
• Broad Coverage: Targets OWASP Top 10 and infrastructure misconfigurations.
Table of Contents
Preview
Installation (Recommended)
Windows
You can install Arkenar instantly using our automated PowerShell script. Copy and paste this command into your terminal:
iwr -useb https://raw.githubusercontent.com/realozk/ARKENAR/main/install.ps1 | iex
Linux & macOS
Run the following command to download and install automatically:
|
Usage
Running ARKENAR is simple. You can scan a single target or use a list of subdomains.
macOS & Linux
# Basic single target scan
)
# Advanced scan with a list and custom rate limit
Windows (PowerShell / CMD)
# Basic single target scan
)
# Advanced scan with a list and output file
Options
| Flag | Description | Example |
|---|---|---|
-l, --list |
Path to a file containing a list of subdomains | -l ~/Desktop/targets.txt |
-o, --output |
Save the scan results to a JSON file | -o result.json |
-t, --threads |
Set the number of concurrent threads (Default: 50) | -t 100 |
--rate-limit |
Set the maximum requests per second | --rate-limit 200 |
--timeout |
Connection timeout in seconds | --timeout 10 |
-v, --verbose |
Enable verbose mode for detailed logs | -v |
--update |
Update ARKENAR and external tools (Katana/Nuclei) | --update |
Troubleshooting
Nuclei permission denied on macOS / Linux
If you see errors like permission denied when Nuclei tries to write its config files, fix the ownership of its config directories:
or for more advanced scan
On Linux, the paths are typically:
Self-update permission denied
If arkenar --update fails with Permission denied, the binary is in a protected directory. Re-run with:
Contributing
Contributions are welcome Please see the CONTRIBUTING.md file for details on how to get started.
License
This project is licensed under the MIT License - see the LICENSE file for details.
Disclaimer
This tool is for educational and authorized testing purposes only. The developer is not responsible for any misuse or damage caused by this tool. Always obtain proper authorization before scanning any target.