
BENEFITS OF MANUAL PEN TESTING. AUTOMATED.
Record browser interactions. Replay with XSS, SQLi, and SSRF payloads. Detect real vulnerabilities — not regex matches. Generate reports in seconds.
Two commands. Record your app, run security tests. Real vulnerabilities found in seconds.
Workflow
From zero to vulnerability report in under a minute. No configuration files required.
Open a browser, interact with your app naturally. Vulcn captures every click, keypress, and form input into a replayable session file.
Replay your session with security payloads injected into every input field. 25+ payload sets covering XSS, SQLi, SSRF, and more.
Execution-based detection confirms real vulnerabilities. No false positives from regex — if alert() fires, the XSS is real.
Generate branded HTML dashboards, machine-readable JSON for CI/CD, or human-friendly YAML. One flag, three formats.
Features
Everything you need to find vulnerabilities, without the bloat of legacy tools.
Replay 100+ payload variations in under 2 seconds. No JVM startup, no XML configs.
Confirms XSS by monitoring actual alert() dialogs and console markers — not regex patterns.
Extend with custom payloads, detectors, and reporters. Hook into every lifecycle event.
Generate branded HTML dashboards, JSON for CI/CD, or YAML for human review.
Record, run, and report from your terminal. Pipe into CI/CD with exit codes.
Chromium, Firefox, and WebKit via Playwright. Auto-detects system Chrome.
Why Vulcn
Compared to OWASP ZAP, Burp Suite, and other legacy scanners.
| Feature | Vulcn | Legacy Scanners |
|---|---|---|
| Setup time | 30 seconds | 15–30 minutes |
| Config format | YAML + CLI flags | XML / GUI panels |
| XSS detection | Execution-based | Pattern matching |
| CI/CD integration | Exit codes + JSON | Plugin required |
| Custom payloads | YAML files | Scripting / API |
| Reporting | HTML, JSON, YAML | HTML / PDF |
| Runtime | Node.js (lightweight) | JVM (heavy) |
| Plugin system | npm packages | Proprietary |
Install Vulcn in 30 seconds. Record your first session. Find real security issues.