Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.marshell.dev/llms.txt

Use this file to discover all available pages before exploring further.

A scan runs in two phases. The second phase only fires the tools that make sense for what the first phase found.

Phase 1 — recon

Always runs. chifu probes the target, then runs a crawler, port scan, fingerprinting, fuzzing, and a fast in-process passive check (headers, robots.txt, .well-known/security.txt, exposed secrets, anti-bot challenge detection). If the target doesn’t respond, phase 2 is skipped.

Phase 2 — vulnerability scanning

Targeted at URLs and forms surfaced by recon — not “just hit the homepage.” Each tool has a gate; the gate is shown in the scan result when it skips.
Skip reasonMeans
target behind CDNPort-scanning Cloudflare/Vercel is pointless. nmap skipped.
static SPAModern frontend (Next.js, Nuxt, etc.) with no server-rendered backend. Legacy-stack tools skipped (nikto, joomscan, WordPress paths in ffuf, sqlmap, dalfox).
needs param URLNo URL with query parameters found. sqlmap and dalfox skipped.
needs CMS = joomlajoomscan only runs on Joomla.

Tools

ToolPhaseWhat it does
probereconHTTP reachability check.
chifu-crawlerreconCrawls up to 300 pages, extracts URLs, forms, tech hints, JS endpoints.
httpxreconStatus, headers, title, tech detection.
nmapreconTop-1000 TCP ports + service versions.
katanareconBackup crawler for server-rendered apps.
subfinderreconSubdomain enumeration via public sources.
whatwebreconTech / CMS fingerprinting.
wafw00freconWAF detection.
ffufreconBrute-forces ~50 high-value paths (admin, .env, swagger.json, …).
nucleivulnRuns thousands of templates against the top 50 surfaces.
sqlmapvulnSQL injection — up to 3 param URLs + 3 POST forms per scan.
dalfoxvulnReflected / stored XSS on the same surfaces.
niktovulnClassic CGI / PHP / Apache misconfig checks.
joomscanvulnJoomla-specific.

CVE lookup

Between phases, chifu matches recon’s tech versions (e.g. nginx 1.18.0, WordPress 6.4.2) against NVD, OSV.dev, and the CISA KEV catalog. Matches appear under Known vulnerabilities on the scan page.

Limits

  • 15 minutes per scan, hard cap.
  • 5 tools in parallel, max.
  • Per-tool timeouts (typically 60–600s). A timed-out tool still contributes whatever it produced.