Skip to main content
Vulcn Hero

What is Vulcn?

Vulcn is a security testing tool that makes it easy to find vulnerabilities in web applications. Instead of manually testing each input field with different payloads, Vulcn lets you:
  1. Record browser interactions once (clicks, form fills, navigation)
  2. Replay sessions with security payloads injected into inputs
  3. Detect vulnerabilities via plugin hooks (dialogs, console, patterns)

Key Features

Record your browser interactions and Vulcn captures them as a replayable session. No need to write test scripts—just use the application normally. bash vulcn record https://example.com --output session.vulcn.yml
Vulcn automatically injects security payloads into form inputs during replay. Built-in payloads cover XSS, SQLi, SSRF, XXE, and more. bash vulcn run session.vulcn.yml --payload xss-basic sqli-basic
Extend Vulcn with plugins for custom detection, payload loading, and reporting. The hook-based architecture makes it easy to add new capabilities. yaml # vulcn.config.yml plugins: - name: "@vulcn/plugin-detect-xss" - name: "@vulcn/plugin-detect-reflection"
Unlike pattern-matching tools, Vulcn detects actual JavaScript execution—when alert() fires, you know the XSS is real.

How It Works

1

Record a Session

Open a browser window and interact with your application. Vulcn captures every click, input, and navigation.
2

Choose Payloads

Select from built-in payloads (XSS, SQLi, etc.) or load custom ones from files or PayloadsAllTheThings.
3

Run Tests

Vulcn replays your session, injecting each payload into every input field and monitoring for vulnerabilities.
4

Review Findings

Get detailed reports of confirmed vulnerabilities with evidence, payloads, and affected URLs.

Installation

npm install -g vulcn
Vulcn uses Playwright for browser automation. Browsers will be installed automatically on first use, or you can run vulcn install to install them manually.

Quick Example

# Initialize configuration
vulcn init

# Record a session (opens browser)
vulcn record https://vulnerable-app.com --output session.vulcn.yml

# Run security tests
vulcn run session.vulcn.yml

# List available payloads
vulcn payloads

Ready to start?

Follow our quickstart guide to find your first vulnerability