Documentation

DS1 Hunter Community Edition

Complete guide to installation, CLI usage, scan modes, modules, and report output.

v1.0.0 Linux · macOS · Windows Authorized use only Back to DS1 Hunter

Overview

DS1 Hunter is an autonomous, self-hosted web application and API security scanner built by DigitalSecurity1. It runs a structured 5-phase assessment pipeline against a target URL and produces a risk-scored, evidence-backed report.

Unlike point tools that check a single vulnerability class, DS1 Hunter chains discovery findings into active exploit attempts, linking what it finds in Phase 1 directly into payload selection in Phase 3. Nothing is sent to external servers. No API keys. No telemetry.

Authorized use only. DS1 Hunter is a penetration testing tool. Only scan systems you own or have written authorization to test. Unauthorized scanning is illegal in most jurisdictions.

Key Capabilities

  • 5-phase autonomous pipeline: recon, crawl, vulnerability scan, exploitation, reporting
  • 43 attack and discovery modules covering OWASP Top 10 and beyond
  • Think Mode: adaptive AI-assisted payload tuning (Deep and Aggressive scans)
  • Safe proof-of-concept generation: logs exact exploit chains, no destructive actions
  • CLI and local Web UI interfaces
  • Proxy and Tor support for stealth engagements
  • Session / cookie injection for authenticated scans
  • HTML, JSON, and Markdown report output

System Requirements

ComponentMinimumRecommended
OSKali 2024+, Debian 12, Ubuntu 22.04 / macOS Ventura 13+ / Windows 10 21H2+Kali Linux 2024+ or Ubuntu 24.04
CPU2 cores4+ cores
RAM4 GB8 GB (Think Mode benefits significantly)
Python3.10 (auto-installed)3.13 (auto-installed)
Disk2 GB4 GB (for report storage)

Download DS1 Hunter Community Edition

Free to download. Self-hosted. No account required. No usage limits.

Linux (Kali, Debian, Ubuntu)

⬇ Download for Linux  ds1hunter-CE-v1.0.0-linux.run
bash
# Run the downloaded installer:
sudo bash ds1hunter-CE-v1.0.0-linux.run

# Handles Python, Node.js, and all dependencies automatically.
# Credentials are printed once at the end. Save them.

macOS (Ventura 13 and later)

⬇ Download for macOS  ds1hunter-CE-v1.0.0-macos.run
bash
sudo bash ds1hunter-CE-v1.0.0-macos.run

# If macOS Gatekeeper blocks it:
xattr -d com.apple.quarantine ds1hunter-CE-v1.0.0-macos.run
sudo bash ds1hunter-CE-v1.0.0-macos.run

Windows (PowerShell as Administrator)

⬇ Download for Windows  ds1hunter-CE-v1.0.0-windows.ps1
PowerShell (Admin)
# Open PowerShell as Administrator, then run:
powershell -ExecutionPolicy Bypass -File ds1hunter-CE-v1.0.0-windows.ps1

# Handles Python, Node.js, services, and certificate automatically.
SHA256 checksums for all installers are available on the GitHub releases page. Always verify the checksum before running.

Quick Start

Run your first scan against an authorized target:

bash
# Normal scan (default)
ds1hunter https://target.example.com

# Deep scan with Think Mode
ds1hunter https://target.example.com --depth deep --think

# Open the Web UI in your browser
# https://127.0.0.1:13000

After install, open https://127.0.0.1:13000 in your browser for the full Web UI, or use the CLI directly. Reports are saved to ./ds1hunter-reports/ by default.

CLI Reference

Core Options

FlagDescriptionDefault
--target URLTarget URL (must include https://)required
--depth MODEnormal, deep, aggressivenormal
--report FORMAThtml, json, md, allhtml
--out DIROutput directory for reports./ds1hunter-reports
--threads NOverride thread count for scan depthdepth default
--timeout NPer-request timeout in seconds10
--uiOpen Web UI at https://127.0.0.1:13000off
--versionPrint version and exit

Authentication

FlagDescriptionDefault
--cookie "K=V"Session cookie for all requests
--header "K: V"Custom HTTP header (repeatable)
--auth user:passHTTP Basic credentials
--token "Bearer ..."Authorization header value

Stealth / Proxy

FlagDescriptionDefault
--proxy URLHTTP/HTTPS/SOCKS5 proxy URL
--torRoute through Tor (requires Tor running locally)off
--delay NMilliseconds between requests0
--user-agent UAOverride default User-Agent stringds1hunter/1.0

Module Control

FlagDescriptionDefault
--modules LISTComma-separated modules to runall
--skip LISTComma-separated modules to skip
--list-modulesPrint all module names and exit

Scan Depths

Three presets control rate, concurrency, wordlist size, and Think Mode payload budget.

Normal Deep (recommended) Aggressive

Normal

~1,000 requests. 5 threads. Up to 25 pages crawled. Standard wordlists. No Think Mode. Ideal for quick assessments or rate-limited environments.

bash
ds1hunter --target https://target.example.com --depth normal

Deep (recommended)

~5,000 requests. 10 threads. Up to 100 pages. Extended wordlists. Think Mode active: 500 adaptive payloads per module tuned to the detected tech stack.

bash
ds1hunter --target https://target.example.com --depth deep

Aggressive

25,000+ requests. 25 threads. Unlimited crawl. Maximum wordlists. Think Mode: 2,000+ payloads per module. Likely to trigger WAF and IDS alerts. Use only with explicit written authorization.

bash
ds1hunter --target https://target.example.com --depth aggressive --report all
Aggressive scans can cause service disruption on under-resourced targets. Only use during authorized maintenance windows.

Think Mode

Think Mode is DS1 Hunter's adaptive intelligence layer, active on Deep and Aggressive depths. Instead of static payload lists it:

  • Detects the target tech stack (framework, server, language, WAF) during Phase 1 recon
  • Generates context-aware payloads tuned to the detected environment
  • Chains Phase 2 discoveries into Phase 3 payload selection
  • Adjusts retry and encoding strategies based on observed response patterns

Think Mode runs entirely locally. No external API calls. The intelligence is bundled with the DS1 Hunter installation.

Think Mode uses more CPU and memory. On resource-constrained machines, prefer --depth deep over aggressive to benefit from Think Mode at lower resource cost.

Scan Phases

All scans run the same 5-phase pipeline. Depth controls how deeply each phase executes.

Phase 1: Recon

Technology fingerprinting, DNS enumeration, subdomain discovery, open port survey, WAF detection, SSL/TLS analysis, email and metadata harvesting. Output builds Think Mode's stack profile.

Phase 2: Crawl and Map

Authenticated and unauthenticated spider. Form discovery, API endpoint enumeration, JavaScript analysis for hidden routes, path fuzzing, parameter extraction. Produces the full URL and parameter map used by Phase 3.

Phase 3: Vulnerability Scan

All 43 modules run against the Phase 2 map. Each module tests a specific vulnerability class with payloads selected by Think Mode (if active) or static lists. Results are scored by severity and confidence.

Phase 4: Exploitation

Medium-confidence or higher findings from Phase 3 are re-tested with proof-of-concept exploit chains. DS1 Hunter generates safe exploit proofs: captured outputs, reflected payloads, and access demonstrations without destructive actions.

Phase 5: Reporting

All findings, exploit chains, and evidence compiled into a risk-scored report. CVSS-style scoring per finding. Remediation guidance included for each vulnerability class.

All 43 Modules

Use --list-modules to print the full list at any time. Use --skip module-name or --modules list to control which run.

Injection (8)

sqlisqli-blindsqli-time nosqlldap-injxpath cmd-injssti

Cross-Site Scripting (3)

xss-reflectedxss-storedxss-dom

Broken Access Control (5)

idorbolapriv-esc path-traversalforced-browse

Authentication and Session (6)

brute-loginsession-fixation jwt-abuseoauth-misconfig csrfcookie-flags

Server-Side (7)

ssrfxxelfi rfirce-chaindeserialization file-upload

API and Modern Web (5)

graphql-injapi-enum mass-assignbfla websocket-abuse

Infrastructure and Recon (6)

port-scansubdomain-enum waf-detectssl-audit http-headerscors-misconfig

Source Code Review (1)

src-review

Total across all categories: 41 active modules + 2 passive recon probes = 43.

Key Module Details

sqli / sqli-blind / sqli-time

Tests GET/POST parameters, HTTP headers (Cookie, User-Agent, Referer), and JSON/XML body values. Error-based, boolean-blind, and time-delay techniques. Think Mode adjusts payload encoding based on detected DBMS (MySQL, PostgreSQL, MSSQL, Oracle).

xss-reflected / xss-stored / xss-dom

Reflected: all injectable positions. Stored: submits to forms and revisits to detect persistence. DOM: analyzes JavaScript for document.write, innerHTML, and eval sinks fed by URL-controlled sources.

ssrf

Tests URL parameters and file-fetch endpoints for Server-Side Request Forgery. Attempts outbound connections to a canary host and cloud metadata endpoints (169.254.169.254, AWS/GCP/Azure internal ranges).

jwt-abuse

Tests for algorithm confusion (RS256 to HS256), alg: none bypass, weak HMAC secrets (wordlist-based), and key injection. Detects JWT tokens in Authorization headers and cookies automatically.

idor / bola

Iterates numeric and UUID object references in parameter values and API paths. Checks whether authorization is validated per-object. Maps to OWASP API Security Top 10 #1.

Reports

Saved to ./ds1hunter-reports/<target>_<timestamp>/ by default. Change with --out /path/to/dir.

HTML Report

Self-contained single HTML file. Executive summary, findings sorted by severity, per-finding request/response evidence, exploit chain notes, and remediation guidance. No server required.

JSON Report

Machine-readable. Suitable for CI pipelines and issue trackers. Schema is stable across minor versions.

json: finding schema
{
  "id":          "sqli-001",
  "module":      "sqli",
  "severity":    "critical",
  "confidence":  "confirmed",
  "cvss":        9.1,
  "url":         "https://target.example.com/api/users",
  "parameter":   "id",
  "payload":     "1' OR 1=1--",
  "evidence":    { "request": "...", "response_diff": "..." },
  "remediation": "Use parameterized queries..."
}

Markdown Report

Plain-text Markdown. Paste directly into pentest report templates, Notion pages, or GitHub issues.

Output Formats

bash
# Single format
ds1hunter --target https://target.example.com --report json

# All formats at once
ds1hunter --target https://target.example.com --report all

# Custom output directory
ds1hunter --target https://target.example.com --report html --out /tmp/pentest-reports/

Config File

DS1 Hunter reads ~/.ds1hunter/config.yml on startup. CLI flags override config file values.

yaml: ~/.ds1hunter/config.yml
# Default scan settings
default_depth:   deep
default_report:  html
output_dir:      ~/ds1hunter-reports
timeout:         15
threads:         10

# Proxy (comment out to disable)
proxy:           socks5://127.0.0.1:9050

# User-Agent override
user_agent:      Mozilla/5.0 (compatible; ds1hunter/1.0)

# Think Mode (deep and aggressive only)
think_mode:      true

Proxy / Tor

HTTP/HTTPS proxy

bash
ds1hunter --target https://target.example.com --proxy http://127.0.0.1:8080

Tor (SOCKS5)

bash
# Start Tor first
sudo service tor start

ds1hunter --target https://target.example.com --tor
--tor is a shorthand for --proxy socks5://127.0.0.1:9050. Think Mode and proxy are fully compatible.

Authenticated Scans

Cookie injection

bash
ds1hunter --target https://app.example.com \
          --cookie "sessionid=abc123; csrftoken=xyz789"

Bearer token

bash
ds1hunter --target https://api.example.com \
          --token "Bearer eyJhbGciOiJIUzI1NiJ9..."

Custom headers

bash
ds1hunter --target https://api.example.com \
          --header "X-Api-Key: sk-live-abc123" \
          --header "X-Tenant-ID: 42"

FAQ

Does DS1 Hunter send any data to external servers?

No. DS1 Hunter is fully self-hosted. No telemetry, no cloud API calls, no usage reporting. The only outbound traffic is the scan traffic you direct at your target.

Is Think Mode a cloud AI service?

No. Think Mode runs locally using model files bundled with the DS1 Hunter package. There is no dependency on any external AI API.

Can I use DS1 Hunter in a CI/CD pipeline?

Yes. The JSON output and non-zero exit code on findings make it suitable for CI integration. Use --depth normal for pipeline scans to keep runtime under a few minutes.

A clean report means the target is secure?

No. A clean report means no automated vulnerabilities were detected at the tested scan depth. It does not replace a manual penetration test. Complex business logic flaws and second-order issues require human analysis. See our pentest services.

How do I update DS1 Hunter?

Download the new installer for your platform from the releases page and run it the same way as the initial install. The installer handles the update automatically.

Scans are slow. How can I speed them up?

Increase threads with --threads N, skip unused modules with --skip mod1,mod2, and avoid aggressive depth unless required. On low-RAM machines, avoid --depth aggressive entirely.

Uninstall

These commands completely remove DS1 Hunter and all its components from your system. All stored hunts and reports inside the installation directory will be deleted.

Back up any reports you want to keep before uninstalling. The directory /opt/ds1hunter (Linux/macOS) or C:\ds1hunter (Windows) is removed entirely.

Linux

bash
# Stop and disable services
sudo systemctl stop    ds1hunter-api ds1hunter-ui
sudo systemctl disable ds1hunter-api ds1hunter-ui

# Remove service unit files
sudo rm -f /etc/systemd/system/ds1hunter-api.service
sudo rm -f /etc/systemd/system/ds1hunter-ui.service
sudo systemctl daemon-reload

# Remove installation, CLI, and service user
sudo rm -rf /opt/ds1hunter
sudo rm -f  /usr/local/bin/ds1hunter
sudo userdel ds1hunter 2>/dev/null
sudo rm -rf /var/lib/ds1hunter

# Optional: remove logs
sudo rm -rf /var/log/ds1hunter

macOS

bash
# Unload and remove launchd services
sudo launchctl unload /Library/LaunchDaemons/com.ds1hunter.api.plist 2>/dev/null
sudo launchctl unload /Library/LaunchDaemons/com.ds1hunter.ui.plist  2>/dev/null
sudo rm -f /Library/LaunchDaemons/com.ds1hunter.api.plist
sudo rm -f /Library/LaunchDaemons/com.ds1hunter.ui.plist

# Remove installation and CLI
sudo rm -rf /opt/ds1hunter
sudo rm -f  /usr/local/bin/ds1hunter

# Remove service user
sudo dscl . -delete /Users/_ds1hunter 2>/dev/null

# Remove certificate from System Keychain
sudo security delete-certificate -c "ds1hunter.local" \
    /Library/Keychains/System.keychain 2>/dev/null

# Optional: remove logs
sudo rm -rf /var/log/ds1hunter

Windows

PowerShell (Admin)
# Stop and remove Windows services
Stop-Service DS1HunterAPI, DS1HunterUI -Force -ErrorAction SilentlyContinue
& "C:\ds1hunter\bin\nssm.exe" remove DS1HunterAPI confirm
& "C:\ds1hunter\bin\nssm.exe" remove DS1HunterUI  confirm

# Remove installation directory and CLI
Remove-Item -Path "C:\ds1hunter" -Recurse -Force -ErrorAction SilentlyContinue
Remove-Item "C:\Windows\System32\ds1hunter.exe" -Force -ErrorAction SilentlyContinue

# Remove TLS certificate from Root CA store
Get-ChildItem Cert:\LocalMachine\Root |
    Where-Object { $_.FriendlyName -eq "DS1 Hunter TLS" } |
    Remove-Item -Force

# Remove Windows Defender exclusion
Remove-MpPreference -ExclusionPath "C:\ds1hunter" -ErrorAction SilentlyContinue
After uninstalling, you can do a clean reinstall at any time by running the installer again. The installer will detect no existing installation and set up from scratch with a new database and credentials.