Frequently Asked Questions

Kayran allows you to stay protected from unknown security vulnerabilities that could be “hiding” in your online assets.
Besides that, Kayran will generate a full report displaying the vulnerabilities found and how to fix them, so you can patch, upgrade and stay protected while continue doing your best work.

In fact, Kayran was designed to be user-friendly and easy to use even for people without technical knowledge. Introduction to Kayran’s Dashboard

Kayran is able to scan and find vulnerabilities in sites that no tool can find, such as SPA sites, in addition, Kayran exploits any ZERO DAY vulnerability that exists – and most importantly the high-speed relative to the market.

Kayran has a dedicated system that knows how to keep your assets secure, the systems will not fall at any stage, and the exploitation of the vulnerabilities will not harm the information or the site.

Kayran will display the targets got scanned, vulnerabilities it detected, requests and so on – only to the user/client using the server.

No, Kayran has a special “Speed” engine which will detect when a overload is potential, and preventing it by dynamically changing the number of requests it will send.

Of course! just contact us via your given contact mail or leave a message.

Yes! simply create a new Project (Projects → New Project) and then, when initiating the scan, select your desired Project (Settings → Project).

How to Associate Scans with Projects

Sure you can! just schedule a meeting through here, we’ll have a “Demo” meeting, showing and explaining everything about Kayran.

Yes! by using our API Documentation !

Problem? no problem! simply tell us through the “Report A Problem” section found in Kayran’s main menu, or, mail us at [email protected]

Support
Report A problem

Yes! and currently, Kayran in the only one that can do it!

Of course! by using a Proxy.

Creating and Setting up Proxy Profiles

The vulnerabilities that Kayran has detected will be categorized according to their level of severity and the level of potential damage they may cause, when the lowest severity is Informative and the highest, is High.

If you initiate a new scan with multiple targets, they will be moved to the active scans section according to the plan you’ve purchased (if none of them will be moved, you’ve either ran out of domains or exceeded the number of active scans you’re allowed).

Queue Sub-Section

 

Mark the vulnerability as FalsePositive and we will check it out as soon as possible!

How to mark FalsePositive

If you’re in the main site (https://kayran.io/), click on “LOGIN” located in the main navigation bar.

A quick Overview of Kayran
Logging In

No! Kayran is a tool that runs on your browser, just make sure your browser is supported and updated.

Every browser.

If you encounter any compatibility issues, please contact us.

Kayran does not give any third-party direct or indirect access to the customer’s data except at your directive or when it’s required by law.

Simple! you can create and use our highly advanced “Self Login” method.

Self Login

Yes, simply create a new Proxy using it.

Creating and Setting up Proxy Profiles

Yes! learn more about it below :

Using Shodan

You can either use your own by creating a proxy Creating and Setting up Proxy Profiles

Or, you can get one from us Requesting a Fixed IP

Yes, and you can also define certain roles for each of them.

Adding Users to your Server

You can use our Support.

Support

Yes, for more information, read our Reports section in Support

Reports

Yes, you can attach scans to projects in each stage it goes through (even after being completed).

How to Associate Scans with Projects

Yes, you can set it up in your Profile.

Setting up Email Notifications

 

Yes, you can set it up in your Profile.

Setting up Email Notifications

 

Yes, you can set it up in your Profile.

Setting up Email Notifications

Yes, you can set it up in your Profile.

Setting up Email Notifications

Yes, simply navigate to the “Server Settings” and, change it there.

For more information, read here :

How to Change my Login Token

Exposing the GIT

Let’s start with defining the meaning of GIT. GIT – is an open-source system which we use as a tool to store data and information

Read More »

Red Team

You’ve probably heard that there are teams in the Cyber field called Red Team and Blue Team. Let’s talk about the red one, shall we?

Read More »