by DigitalSecurity1

DS1 Hunter

"Hunt. Chain. Prove."

Autonomous 5-phase web application security scanner developed by DigitalSecurity1. DS1 Hunter discovers endpoints, maps attack chains across vulnerabilities, and generates safe exploit proofs so findings are evidence-backed and defensible in any report.

🧠 Think Mode 3 Scan Depths Community v1.0.0 · Free 40+ Modules
● Self-hosted, no cloud ● No usage limits ● Tor / proxy ready ● CLI + Web UI
43
Attack Modules
5
Autonomous Phases
🧠
Think Mode AI
3
Scan Depths
Free
Community Edition
Three Scan Depths: You Choose the Aggression

From a quick polite recon to a full-saturation assault. Every depth is a tuned preset: rate, concurrency, wordlist size, and payload budget. Not just a slider.

🔎
Normal
~1,000 requests
Concurrency10 concurrent
Rate limitPolite
Pages crawledUp to 50
WordlistStandard
Think ModeNot available
Quick assessment, low noise. Good for initial target mapping or rate-limited environments.
🧠 Think Mode 💥
Aggressive
~15,000+ requests
Concurrency50 concurrent
Rate limitMax speed
Pages crawledUp to 1,000
WordlistFull coverage
Think Mode budget2,000 payloads/module
Maximum saturation. Bug bounty finals, internal pentest engagements. Think Mode runs full capacity, including runtime-generated payloads from observed responses.
🧠 Think Mode
Adaptive AI that learns
the target's stack first

Standard scanners blast the same payload library at every target: Django apps get PHP injections, Nginx gets Apache-specific exploits. Think Mode eliminates that noise. It fingerprints the target first, then selects and generates payloads that actually apply.

⚠ Requires --depth deep or --depth aggressive
Step 1
🔍
Fingerprint
Reads response headers, error messages, timing patterns, and cookie names to identify the exact framework, language, database, and server, before firing a single payload.
Step 2
🎯
Select
Scores every payload by relevance to the detected stack. A Django target gets Python SSTI, ORM-specific SQLi, and Django debug patterns, not 10,000 irrelevant PHP payloads.
Step 3
Generate
Creates brand-new payloads at runtime from observed responses. Spots a Django debug page mid-scan? Generates targeted RCE and SSTI variants on the fly for that exact error context.
500
Deep + Thinktargeted payloads per module
2,000
Aggressive + Thinkpayloads per module incl. runtime-generated
Think Mode: CLI
# Enable Think Mode (requires deep or aggressive)
ds1hunter https://target.com --depth deep --think

# Aggressive + Think + WAF bypass: maximum coverage
ds1hunter https://target.com --depth aggressive --think --waf-bypass
5 Autonomous Phases: Every Hunt Feeds the Next

DS1 Hunter builds a complete picture of the target across 5 linked phases before generating a final risk-scored report. No one-shot scans.

Phase 1
🔍
Endpoint Discovery
Crawls the target, finds hidden admin APIs, JS routes, and undocumented endpoints via active spider and wordlist probing.
Phase 2
🔐
Authorization Analysis
Tests every discovered endpoint for IDOR, broken access control, privilege escalation, and authentication bypass.
Phase 3
⛓️
Attack Chain Mapping
Links individual vulnerabilities into multi-step exploit sequences. IDOR + SQLi + SSRF becomes a single scored attack path.
Phase 4
🧠
Business Logic Testing
Probes payment flows, price manipulation, race conditions, integer overflow, DOM XSS, and workflow bypass vulnerabilities.
Phase 5
Exploit Proof
Generates safe, non-destructive proof-of-exploitation for every confirmed chain. Every finding ships with evidence the client can verify.
Everything a professional security tester needs

Built for bug bounty hunters and pentesters. No cloud subscription, no per-target fees, no paywalled payloads.

🧠
Think Mode AI
Tech-stack-aware payload selection and runtime payload generation. Fingerprints the target first, then hunts with relevant payloads only, not a fixed spray.
📈
Attack Chain Graph
Interactive graph visualises how individual vulnerabilities connect into multi-step exploit chains, risk-scored for triage and reporting.
🛠️
WAF Bypass Engine
Profiles the target WAF and selects evasion payloads automatically. Origin-IP bypass mode discovers the real server behind CDN/WAF filtering.
Real-Time Dashboard
Watch every HTTP request, phase transition, and finding live. Attack log with live counter, elapsed timer, and WebSocket-powered progress.
🔭
Built-In OAST Server
No external service required. Catches blind SSRF, blind XSS, and OOB SQL injection that standard scanners miss entirely.
🔌
Tor / Proxy Routing
All scan traffic routes through your configured SOCKS5 proxy or Tor. Your real IP never leaks, verified against the Tor exit-node API.
📋
Proxy Interceptor Suite
Full intercepting proxy with Repeater, Intruder, Comparer, and Decoder. Inspect, replay, and fuzz live requests directly in the dashboard.
📝
PDF / HTML / JSON Reports
Professional reports with executive summary, severity breakdown, attack chain narrative, evidence, and remediation steps. One click from the dashboard.
🔐
Auth Profile Manager
Stores Bearer, Cookie, Basic, OAuth2, and form-auth profiles. Dual-mode scanning covers both authenticated and unauthenticated paths per hunt.
DS1 Hunter vs Traditional Scanners

Most commercial scanners fire a fixed payload library at every target regardless of stack. DS1 Hunter thinks before it shoots.

Capability Traditional Scanners DS1 Hunter
Payload approachFixed library, same for every target🧠 Think Mode · tech-aware, runtime-generated
Scan depth controlUsually one-size-fits-all✓ Normal / Deep / Aggressive presets
Out-of-band (OAST)External cloud service or not included✓ Built-in OAST server, no external dependency
WAF bypassBasic evasion only✓ WAF profiling + origin-IP bypass
Attack chain mappingIndividual findings, no chaining✓ 5-phase chain mapping, scored paths
Intercepting proxySeparate tool required✓ Integrated: Repeater, Intruder, Decoder
AI / LLM testing✗ Not included✓ Dedicated AI/LLM module
Mobile testing✗ Not included✓ Dedicated mobile module
Binary exploitation✗ Web-only✓ Buffer, stack, heap, memory corruption
DeploymentCloud / SaaS subscription✓ 100% self-hosted, your data stays local
Price$449 – $999+/year✓ Free · Community Edition, no limits
Purpose-Built Security Modules

Dedicated professional tools for specialized testing. All included in the free community edition.

Core
🎯

Hunts

The main 5-phase autonomous security scanner. Runs endpoint discovery, authorization analysis, attack chain mapping, business logic testing, and exploit proof generation in one automated pipeline.

  • 5-phase automated pipeline, each phase feeds the next
  • Authenticated and dual-mode scanning
  • Think Mode AI: tech-stack-aware payload selection
  • WAF bypass and origin-IP bypass
  • PDF, HTML, and JSON report generation
① Recon
🌎

Recon

Maps the full attack surface before any scanning begins. Six dedicated tools covering passive and active reconnaissance.

  • Target Intelligence: headers, tech stack, cookies
  • Spider / Crawl: SPA-aware web crawler
  • Subdomain Takeover detection
  • SSL / TLS certificate analysis
  • Git and SVN repository exposure
  • JavaScript secrets extraction
② Discovery
🔍

Discovery

Active discovery tools that probe the target for hidden endpoints, undocumented parameters, and exploitable surfaces not visible from the outside.

  • Active Scanner: Playwright crawl + vulnerability probing
  • Param Miner: wordlist-based hidden parameter discovery
  • Probe: targeted manual endpoint probing
③ Intercept
🔀

Intercept

Full HTTP/HTTPS interception suite for manual testing, request replay, fuzzing, and encoding directly inside the dashboard.

  • Proxy: intercept and modify live traffic
  • Repeater: manual request replay and editing
  • Intruder: payload-based request fuzzing
  • Decoder: Base64, JWT, URL, HTML encoding
  • Comparer: side-by-side response diffing
④ Injection

Injection

Ten dedicated injection and blind vulnerability modules covering every major injection surface in web applications and APIs.

  • SQLi Mapper: error-based, boolean-blind, time-blind
  • XSS Scanner and DOM XSS
  • SSTI Detector: 5 template engine payloads
  • XXE Injector: file read and SSRF via XML
  • Command Injection: timing and error-based
  • SSRF Tester: URL params and cloud metadata
  • Prototype Pollution, Open Redirect, OAST
⑤ Protocol Attacks
🚢

Protocol Attacks

Tests for weaknesses at the HTTP protocol level, including request smuggling, response splitting, race conditions, and WebSocket security.

  • HTTP Request Smuggling (CL.TE, TE.CL, TE.TE)
  • HTTP Response Splitting
  • Race Condition testing
  • WebSocket security testing
⑥ Auth & Access
🔑

Auth & Access

Four tools targeting authentication weaknesses, broken access control, and token predictability.

  • JWT Analyzer: algorithm confusion, none alg, weak secrets
  • BOLA / IDOR: object-level access control testing
  • CORS Scanner: misconfiguration detection
  • Sequencer: token entropy and randomness analysis
⑦ API Testing
⚙️

API Testing

Four dedicated API security tools covering REST, GraphQL, OpenAPI/Swagger schemas, and full API audit reporting.

  • API Pentest: 19 check types, path and param fuzzing
  • GraphQL Scanner: introspection, batching, injection
  • OpenAPI / Swagger: schema-driven endpoint testing
  • API Audit: compliance and security audit reporting
⑧ Binary
💥

Binary

HTTP-level memory corruption fuzzer. Sends cyclic and oversized payloads to detect crashes, stack traces, and crash boundaries in HTTP-exposed services.

  • Buffer Overflow: cyclic pattern fuzzing, crash detection
  • Stack Overflow: stack corruption boundary detection
  • Heap Overflow: heap corruption via HTTP inputs
  • Memory Corruption: error pattern and crash analysis
⑨ Mobile
📱

Mobile Pentest

OWASP MASVS v2 aligned testing for Android APK and iOS IPA. Combines static analysis with Frida-based dynamic instrumentation.

  • Android APK static analysis
  • iOS IPA binary checks
  • Frida script generation for runtime analysis
  • Certificate pinning and auth flow testing
⑩ Code Review
👀

Source Code Review

Multi-language SAST with OWASP Top 10, CWE, and CVSS mapping. Scans source files for security issues without executing the code.

  • Hardcoded credentials and secrets detection
  • Insecure function and pattern matching
  • OWASP Top 10 and CWE classification
  • Dependency CVE and vulnerability lookup
⑪ AI / LLM
🤖

AI / LLM Scanner

Tests AI-powered applications against the OWASP LLM Top 10 (2025). Detects prompt injection, data leakage, and exposed model APIs.

  • Prompt Injection and system prompt leakage
  • Sensitive information disclosure via model
  • Excessive agency and unbounded consumption
  • Exposed model API and API key leakage detection
43 Built-In Attack Modules

Every module ships in Community Edition. No locked features, no paywalled payloads.

① Recon
🔮 Target Intelligence
🕷 Spider / Crawl
🌏 Subdomain Takeover
🔒 SSL / TLS
📁 Git Exposure
🔑 JS Secrets
② Discovery
🎯 Active Scanner
🔍 Param Miner
⚡ Probe
③ Intercept
🔀 Proxy
↻ Repeater
🔫 Intruder
🔤 Decoder
⚖ Comparer
④ Injection
🗺 SQLi Mapper
⚡ XSS Scanner
🕵 DOM XSS
🧩 SSTI Detector
📨 XXE Injector
💉 Command Injection
🌐 SSRF Tester
☠ Proto Pollution
↪ Open Redirect
📡 OAST / Out-of-Band
⑤ Protocol Attacks
🚢 HTTP Smuggling
✂ Response Splitting
⚡ Race Condition
🔌 WebSocket Tester
⑥ Auth & Access
🔑 JWT Analyzer
🔓 BOLA / IDOR
🔗 CORS Scanner
🎲 Sequencer
⑦ API Testing
🔬 API Pentest
◆ GraphQL Scanner
📄 OpenAPI / Swagger
🛡 API Audit
⑧ Binary
💥 Buffer Overflow
📚 Stack Overflow
🏗 Heap Overflow
💣 Memory Corruption
⑨ Mobile
📱 Mobile Pentest
⓪ Code Review
👀 Source Code Review
⓫ AI / LLM
🤖 AI / LLM Scanner
Up and running in minutes

Runs on Linux, macOS, and Windows. After install, the ds1hunter command is available globally.

Install
# Linux (Kali, Debian, Ubuntu)
sudo bash ds1hunter-CE-v1.0.0-linux.run

# macOS (Ventura 13+, Intel + Apple Silicon)
sudo bash ds1hunter-CE-v1.0.0-macos.run

# Windows (PowerShell as Administrator)
powershell -ExecutionPolicy Bypass -File ds1hunter-CE-v1.0.0-windows.ps1

# After install: open your browser
# Web UI  → https://127.0.0.1:13000
# API     → https://127.0.0.1:18000
ds1hunter: CLI
# Standard scan
ds1hunter https://target.com

# Deep + Think Mode
ds1hunter https://target.com --depth deep --think

# Max aggression: Think + WAF + origin bypass
ds1hunter https://target.com --depth aggressive \
  --think --waf-bypass --origin-bypass

# Auth testing with dual tokens
ds1hunter https://target.com --mode auth \
  --token-user-a $TOKEN_A --token-user-b $TOKEN_B

# Deep scan via Tor → PDF report
ds1hunter https://target.com --depth deep --think \
  --proxy socks5://127.0.0.1:9050 --output pdf
DS1 Hunter Community Edition

Free to download. Self-hosted. No account required. No usage limits.

Linux
Kali 2024+, Debian 12, Ubuntu 22/24 (.run)
Community v1.0.0
⬇ Download for Linux
macOS
macOS Ventura 13+, Intel & Apple Silicon (.run)
Community v1.0.0
⬇ Download for macOS
Windows
Windows 10 21H2+, Windows 11 native (.ps1)
Community v1.0.0
⬇ Download for Windows

Also available on GitHub · v1.0.0 release assets.

DS1 Hunter is free. Keep it that way.

If DS1 Hunter saved you time on an engagement, consider buying us a coffee. Every contribution helps us maintain and improve the tool for the community.

Donate via PayPal
No account needed · credit and debit cards accepted
User Reviews
What Users Are Saying

Real feedback from security professionals and researchers who use DS1 Hunter.

No reviews yet. Be the first to share your experience with DS1 Hunter.
Leave a Review

Used DS1 Hunter? Share your experience to help others.

Not displayed publicly. One review per email.