scan4all provides extensive vulnerability detection capabilities with over 15,000 POCs (Proof of Concepts) from multiple sources including nuclei templates, vscan POCs, and custom scan4all POCs. The detection engine automatically runs after service discovery and fingerprinting.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/GhostTroops/scan4all/llms.txt
Use this file to discover all available pages before exploring further.
POC Coverage
scan4all integrates three major POC sources for comprehensive vulnerability coverage:Nuclei Templates
Embedded nuclei templates provide the largest coverage with 3922 YAML-based POCs.Top 10 Statistics
By Tag
| Tag | Count |
|---|---|
| cve | 1430 |
| panel | 655 |
| edb | 563 |
| lfi | 509 |
| xss | 491 |
| wordpress | 419 |
| exposure | 407 |
| cve2021 | 352 |
| rce | 337 |
| wp-plugin | 316 |
By Severity
| Severity | Count |
|---|---|
| info | 1474 |
| high | 1009 |
| medium | 818 |
| critical | 478 |
| low | 225 |
| unknown | 11 |
Coverage by Category
| Directory | Files | Description |
|---|---|---|
| cves | 1407 | CVE exploits and checks |
| exposed-panels | 662 | Admin panel detection |
| vulnerabilities | 509 | Known vulnerability checks |
| technologies | 282 | Technology-specific checks |
| exposures | 275 | Information disclosure |
| misconfiguration | 237 | Config errors |
| token-spray | 230 | Token/credential checks |
| workflows | 189 | Multi-step checks |
| default-logins | 103 | Default credentials |
| file | 76 | File-based checks |
VScan POCs
Integrated vscan engine includes:- 300+ xray 2.0 POCs - Covering web vulnerabilities and framework exploits
- Custom Go POCs - Native Go implementations for specific vulnerabilities
- Enhanced matching - Advanced detection logic for complex vulnerabilities
Scan4all Custom POCs
scan4all includes custom Go-based POCs for critical vulnerabilities:View the complete POC list in the source repository at
static/pocs.mdVulnerability Detection Process
scan4all’s vulnerability detection follows an intelligent workflow:Service Fingerprinting
After port scanning, services are fingerprinted to identify technology stacks, versions, and frameworks.
POC Selection
Relevant POCs are selected based on:
- Detected technologies (Weblogic, Spring, etc.)
- Service types (HTTP, database, etc.)
- Fingerprint matches
- Version information
POC Execution
Selected POCs are executed with:
- Rate limiting to prevent DoS
- Custom headers and cookies
- Timeout controls
- Error handling
Result Validation
Responses are validated against POC-specific criteria:
- Status codes
- Response body patterns
- Headers
- Response timing
Configuration
Enabling/Disabling POC Checks
Custom Headers and Cookies
POC checks support custom headers for authentication:Custom cookies are compatible with nuclei, httpx, go-poc, x-ray POC, filefuzz, and HTTP Smuggling detection.
DNSLOG Integration
Many POCs require DNS logging for out-of-band detection:Ceye.io Configuration
- Detects blind SSRF vulnerabilities
- Identifies remote code execution through DNS queries
- Validates deserialization vulnerabilities
- Confirms XXE (XML External Entity) issues
Log4j Scanner Integration
scan4all links with a customized log4j-scan for comprehensive Log4Shell detection:Nuclei Template Customization
Custom DSL Helpers
scan4all enhances nuclei with custom DSL functions:Template Locations
Nuclei templates are embedded in the binary but can be customized:Vulnerability Categories
Remote Code Execution (RCE)
Spring Framework
- CVE-2022-22965 (Spring4Shell)
- CVE-2022-22947 (Gateway RCE)
Apache Log4j
- CVE-2021-44228 (Log4Shell)
- JNDI injection variants
Weblogic
- Multiple deserialization RCEs
- T3/IIOP protocol exploits
JBoss
- CVE-2017-12149
- Deserialization vulnerabilities
Authentication Bypass
Information Disclosure
- Exposed panels: 662 admin interface checks
- File exposure: .git, .svn, backups, configs
- Error messages: Stack traces, debug info
- API endpoints: Swagger, GraphQL, API docs
Deserialization Vulnerabilities
Performance Optimization
Concurrent POC Execution
scan4all uses goroutine pools for parallel POC execution:Rate Limiting
Prevent overwhelming targets:Timeout Configuration
Output and Reporting
JSON Output Format
Elasticsearch Integration
Store results in Elasticsearch for centralized management:Advanced Detection Features
Technology-Specific Checks
scan4all automatically enables POCs based on fingerprinting:Workflow Templates
Multi-step vulnerability detection:Supply Chain Scanning
Automated dependency vulnerability detection:- Identifies software components and versions
- Matches against CVE databases
- Checks for outdated libraries
- Detects vulnerable dependencies
Example Workflows
Best Practices
Troubleshooting
No Vulnerabilities Found
- Check fingerprinting: Ensure technologies were correctly identified
- Enable verbose mode:
scan4all -host example.com -v - Verify POCs enabled: Check that
-npflag is not set - Review logs: Check for POC execution errors
False Positives
- Web Application Firewalls (WAF) may trigger false positives
- Use
-proxyflag to route through Burp/ZAP for analysis - Check response bodies manually for verification
Rate Limiting
If POCs are being blocked:- Reduce rate:
-rate 50 - Decrease concurrency:
-c 5 - Increase timeout:
-timeout 10000