FREE ACCESS & MORE: Syhunt takes action to help secure entities and businesses amid COVID-19 pandemic Read now

Most of the improvements described on this page apply as well to the Community Edition of Syhunt. If you prefer to read only what's new in Syhunt Community, visit here.

What's New in Syhunt 6.9.1 (August 25, 2020)

Syhunt Hybrid and Community 6.9.1 Adds 3.5x Faster, Incremental Scans

Today we announce yet another update for Syhunt Hybrid and Community, with the addition of 3.5x faster, incremental DAST and SAST analysis. With the new feature available in Syhunt 6.9.1, results and data from scans against a specific target URL or codebase are automatically stored and used to speed up future scans.

To give an idea on how important this new feature is, a dynamic scan against the PreyServer (our vulnerable demo web app) which usually has a duration of 2m10 got reduced to just 38 seconds with incremental scan after the first scan has been executed. In a very similar way, a code scan against a very large test codebase with a duration of 6m21 got reduced to 1m49 after the first scan.

All Syhunt scans are now by default incremental scans. Syhunt will automatically manage the new feature, discarding its cached incremental scan data when appropriate.

Other Improvements

  • Added check for SQUID-2020 Cache Poisoning Issue in HTTP Request processing (CVE-2020-15049)
  • Allow incremental scan to be enabled or disabled from site preferences and schedule preferences dialogs (enabled by default).
  • Allow incremental scan data to be manually cleared from the Dynamic Targets and Scheduled Scans lists. Events such as upgrading Syhunt or 90 days passed since the incremental cache was created will make Syhunt automatically reset its incremental cache.
  • Added -inc parameter that allows to set the incremental scan mode in ScanURL and ScanCode CLI tools.
  • Improved scan scheduler (Improved list of scheduled scans with new columns and icons, added the Scan Scheduler to the Launcher screen, allow to rename a scheduled scan, and more).
  • Allow columns to be sorted.
  • Bug fixes: the status of a scan in progress being reported as Cancelled in the past sessions screen (bug introduced in, the Target column will display proper target name for new scans in the past sessions screen, and fixed a hash generation problem that would rarely cause a crash.

We hope you enjoy the new release!

What's New in Syhunt 6.9 (August 4, 2020)

and more

Syhunt Hybrid and Community 6.9 now runs on modern Linux distributions

Note (August 9): We successfully tested Syhunt 6.9 on additional Linux distros and versions: Debian 9 and 10, CentOS 8 Minimal, Manjaro 19, Linux Mint 20, MX Linux 19 and Elementary OS 5.1.

We're excited to announce the immediate release of Syhunt Hybrid and Syhunt Community version 6.9, the first Syhunt release to embrace cross-platform integration. In the recent past, Syhunt embraced open-source development, by releasing the source code of the Syhunt Sandcat browser, Huntpad, and many other core software and libraries the company developed and actively maintains. With today's release, Syhunt 6.9 just runs, out-of-the-box on Kali Linux and Parrot Security OS, and with almost zero effort runs on any 64-bit Linux distribution - we successfully tested Syhunt on 14 popular Linux distributions, including Ubuntu (Server and Desktop), CentOS, Fedora and openSUSE and, we documented it.

To make Syhunt for Linux possible for its customers and the community today and in the long term, Syhunt added a cross-platform, Java-based installer and worked to make its software compatible with Wine64, expand its command-line and REST-based interfaces and integration features, while at the same time Syhunt is working on native 64-bit binaries for key Linux distributions.

Read more about Syhunt for Linux

Other Improvements

  • Added option to export vulnerabilities as ModSecurity CRS virtual patching rules when generating a report.
  • Added manual login option to ScanURL CLI tool (parameter -atype:Manual).
  • Added the ScanCore tool which allows various CLI-based operations such as update Pen-Tester Key, display keys information, generate web API key, manage and use issue trackers and more.
  • Improved Scheduler with many new options and bug fixes.
  • Allow by default complete export of preferences through menu -> Import & Export options with new .scpbak extension.
  • Past Sessions now displays by default scans from last 7 days and can be changed to display different periods from toolbar.
  • HTML report now include all required assets within the same file.
  • Improved task management and setup application.
  • Improved GitHub and GitLab tracker integration.
  • Improved spider rules.

We hope you enjoy the new cross-platform release!

What's New in Syhunt 6.8.6 (July 1, 2020)

Syhunt Hybrid 6.8.6 now integrates with GitLab CI and PowerShell

We're proud to announce the release of Syhunt Hybrid version 6.8.6. The new version adds integration with GitLab's Continuous Integration and Security Dashboard, enabling Syhunt to continually scan web and mobile applications in repositories on and GitLab self-hosted versions looking for the 2019 CWE Top 25 Most Dangerous Software Errors, OWASP Top 10, OWASP Mobile Top 10 and many other vulnerabilities. The integration combines SAST and DAST methodologies within the DevOps pipeline and stages. In addition to the features above, Syhunt 6.8.6 adds integration with PowerShell, pass/fail testing and JSON export, making it quick and straightforward to integrate Syhunt to your development, testing, and deployment workflow.

Read more about integrating Syhunt and GitLab CI/CD

Read more about integrating Syhunt and PowerShell

Other Improvements

  • Improved accuracy when checking for backup files and brute-forcing for files and directories (Syhunt Dynamic).
  • Added -pfcond parameter in CLI scan tools for performing pass/fail testing.
  • Added -gx and -xout parameter in CLI scan tools which allow to generate result exports in addition to reports.
  • Fixed: outdated false positive involving latest mod_fcgid (Syhunt Dynamic).
  • Fixed: false positive cases when analyzing ASP.Net CSharp code (Syhunt Code).

We hope you enjoy the new release!

What's New in Syhunt 6.8.5 (June 10, 2020)

Syhunt Hybrid 6.8.5 released, adds GitLab support and extends issues integration

We're happy to release Syhunt Hybrid version 6.8.5. The new release brings extended issue tracker integration with support for GitLab issues, custom labels and fields in any tracker, personal access token support, improved checks for weak or missing HTTP security headers and bug fixes.

Issue Tracker Integration Improvements

Syhunt 6.8.5 extends the issue tracker integration options , making it even easier to configure trackers and submit details about vulnerabilities that have been identified during a scan to projects from within the Syhunt application. This includes GitHub, GitLab and JIRA projects.

  • Added GitLab issue tracker support.
  • Improved Jira support: allow editing custom fields in tracker preferences screen.
  • Allow editing a list of labels when configuring issue trackers of any kind.
  • Allow personal access token in GitHub tracker preferences.

Improved Header Checks and Bug Fixes

The newly added checks for weak or missing security headers got its first revision which addressed two specific false positive cases:

  • a Permissive HSTS Header check false positive case.
  • Missing Content Sniffing XSS Protection false positive (X-Content-Type-Options).

In addition to the false positive cases above, the following bugs were addressed in Syhunt Dynamic: a TLS 1.2 handshake issue, a case of http-equiv related redirect handling issue and a bug in experimental IDS Evasion feature (disabled by default) that when the option was enabled, the request version would be set incorrectly.

We hope you enjoy the new release!

What's New in Syhunt 6.8.3 (May 1, 2020)

Note: Syhunt 6.8.4 (released in May 21) includes an update notification feature and some bug fixes.

Syhunt Hybrid 6.8.3 released, adds enhanced DAST fingerprinting, manual login and more

We're happy to release Syhunt Hybrid version 6.8.3. The new release brings many important DAST improvements, including enhanced web server fingerprinting, integration with Google Chrome and Mozilla Firefox, hybrid client-side JavaScript code analysis (SAST-within-DAST), and more.

Syhunt Hybrid 6.8.3 adds Hunter-Sense™, a fingerprinting feature that allows the detection of the hidden versions of server software and components. If an Apache or Nginx web server or server module is configured to hide its version, Syhunt Hunter-Sense is many times able to reconstruct the incomplete "picture" and determine the version number of the server and its components, such as PHP, mod_ssl, OpenSSL and Phusion Passenger. The pioneer feature is based on an analysis we conducted of patterns found in 1 million Internet websites and allows Syhunt to detect outdated, vulnerable server software and components that would go otherwise unnoticed.

Outdated Server Sofware Detection

Syhunt Hybrid 6.8.3 adds over 1200 checks for outdated, vulnerable server software, covering over 30 web server software and components — powered by its new Hunter-Sense fingerprinting capabilities. In addition to this, Syhunt Code has been integrated with Syhunt Dynamic to perform extended hybrid analysis of client-side JavaScript - Syhunt's SAST now runs from within its DAST. This innovative SAST-within-DAST approach allows that both custom vulnerable JavaScript code and outdated, vulnerable third-party JavaScript libraries are detected client-side through dynamic analysis.

Manual Login in External Browser

Syhunt Hybrid 6.8.3 integrates with Google Chrome and Mozilla Firefox without the need of installing a browser extension. This adds the ability to launch a scan against a web application after logging in from an external web browser instance - an easy 3-step process. Alternatively, automated login and manual login through Syhunt's built-in, Chromium-based Sandcat browser is still available.

Other Improvements

  • Moved crawling depth limit option and OAST option to the Site Preferences screen.
  • Changed default browser emulation mode and user agent to Chrome.
  • Improved parsing of JavaScript in HTML files.
  • Report generation now runs in an isolated task.
  • Allow SSH protocol in GIT URLs
  • Fixed: crash during outdated code check when scanning known third-party script.

We hope you enjoy the new release!

What's New in Syhunt 6.8.2 (April 2, 2020)

Syhunt Hybrid 6.8.2 released, adds static code analysis of Ruby web apps and more

A new update released today brings a long-awaited feature to Syhunt: SAST for Ruby based web applications. Syhunt 6.8.2 is now able to scan the source code of web applications in Ruby (Rails and ERB) for security bugs with coverage for over 19 vulnerability categories. Of all the programming languages which have been added to Syhunt over recent years, Ruby was the only important one that was missing. In addition to this important new feature, Syhunt 6.8.2 also includes compliance reporting and scan method for the 2019 CWE Top 25 Most Dangerous Software Errors, and Imperva SecureSphere compatible vulnerability export for allowing virtual patching of new vulnerabilities as they are identified by the tool.

Code Checks for Ruby

Syhunt 6.8.2 adds source code checks for the following vulnerabilities and weaknesses in Ruby code:

  • Cross-Site Scripting (XSS)
  • SQL Injection
  • Arbitrary File Manipulation
  • Broken Cryptography
  • Code Injection
  • Denial of Service
  • Hardcoded Sensitive Information
  • HTTP Header Injection
  • Insecure Communication
  • Insecure Data Storage
  • Information Disclosure
  • Log Forging
  • Bad Practices
  • Weak Password Hashing
  • Command Execution
  • Security Misconfiguration
  • Server-Side Request Forgery
  • Uncontrolled Format String
  • Unvalidated Redirect

Other Improvements

  • Added header manipulation checks in Syhunt Dynamic.
  • Added beta Imperva SecureSphere WAF XML output for virtual patching.
  • Added a compliance template for the 2019 CWE Top 25 Most Dangerous Software Errors.
  • Added two new scan methods: CWE Top 25 and OWASP Top 10, which allow to scan specifically for the top 25 most dangerous software errors and the 10 most critical web application security risks.
  • Added an important cleanup of temporary files created during OAST testing in Syhunt Dynamic.
  • Improved parsing of Python code.

We hope you enjoy the new release!

What's New in Syhunt 6.8.1 (March 6, 2020)

Syhunt introduces Hybrid-Augmented Analysis, OAST & Android APK Analysis capabilities

We are proud to introduce version 6.8.1 of Syhunt and, at the same time, unveil its online Syhunt Signal service ( The Syhunt scanner integration with Syhunt Signal adds the ability to perform OAST (Out-of-Band Application Security Testing), which allows Syhunt to detect a range of otherwise invisible, high-risk out-of-band (OOB) vulnerabilities, as well as to perform Hybrid-Augmented Analysis, a combination of DAST, SAST and OAST methodologies. Using a range of OAST techniques, Syhunt 6.8.1 is also able to demonstrate data exfiltration from a vulnerable target web server. Out-of-band (OOB) vulnerabilities are usually high-risk, such as variants of OS Command Injection, SQL Injection and XXE Injection that cannot be detected by conventional DAST, making the adoption of the OAST methodology necessary.

As part of this release, we've also expanded Syhunt's MAST (Mobile Application Security Testing) capabilites with the ability to reverse engineer and scan Android Package (APK) files for OWASP Mobile Top 10 and CWE/SANS Top 25 risks.

Hybrid-Augmented Analysis & OAST

Syhunt Hybrid simulates inferential, in-band and out-of-band (OOB) attacks by using entry point and other information acquired through SAST and a combination of DAST and OAST. Syhunt's online OAST service, known as Syhunt Signal, listens to forced requests coming in from a vulnerable target web server over the course of a scan and signals back to the Syhunt scanner. Syhunt then automatically correlates the received Signal alerts with attack requests it launched and adds the identified vulnerabilities to its report and user interface. The collaboration with Syhunt Signal also allows the Syhunt scanner to automatically exfiltrate data from a vulnerable target, which gets added to the scan results. This is achieved through different techniques (environment and OS-specific).

The OAST capability is available at no additional cost to existing Syhunt Dynamic and Syhunt Hybrid customers. The new feature needs an active Internet connection to work, so that Syhunt Dynamic can communicate with Syhunt Signal.

Out-of-Band Vulnerability Checks

Syhunt 6.8.1 adds checks for the out-of-band variants of the following vulnerabilities:

  • Command Execution
  • Remote File Inclusion (RFI)
  • Server-Side Request Forgery (SSRF)
  • SQL Injection
  • XML External Entity (XXE) Injection

Android APK Analysis

Syhunt 6.81 adds the ability to scan Android Package (APK) files for vulnerabilities. The new feature is available at no additional cost to existing Syhunt Mobile, Syhunt Code Plus or Syhunt Hybrid Platinum Plus customers and allows to scan an Android application for vulnerabilities without the need of having its source code files. Despite the support for APK files, it is still recommended to scan the original mobile application source code files if available, since the APK file analysis uses reverse engineering techniques.

Other Improvements

  • Added the ability to scan a single source code file from the New Scan dialog.
  • Fixed: some redundant reporting of remote file inclusion vulnerabilities.
  • Fixed: a problem with individual source code file scan with ScanCode CLI.
  • The CLI tools now highlight in red about fatal errors.

We hope you enjoy the new release!

What's New in Syhunt 6.8 (January 27, 2020)

Syhunt expands vulnerability checks for iOS apps and missing protections in web apps

In September last year we announced support for mobile applications (Android & iOS). Now we are proud to introduce version 6.8 of Syhunt, which greatly extends its iOS check base, as well as expands its vulnerability checks for dynamic web apps. As part of this major update, we've increased the number of source code checks for Swift & Objective-C, the primary languages used for iOS app development, from 64 to 248 checks - see the full list of vulnerability checks here and a brief list of the covered categories below.

We've also added many customer-requested improvements and fixes, including new outdated Angular checks and dozens of checks for missing protections which tell when the webserver configuration can be hardened.

Checks for Missing Protections in Web Apps

Syhunt 6.8 adds dozens of checks for missing protection measures against attacks like clickjacking, content-sniffing XSS and others. This includes checks for missing or weak HTTP security headers, permissive HTTP Strict Transport Security (HSTS) policy, the use of deprecated policies and more.

New Mobile Checks for Swift & Objective-C

Syhunt 6.8 adds 184 new security code checks targeting the primary iOS development languages, covering:

  • API Abuse & Misuse (new, to cover Biometric Authentication, SMS Usage, etc.)
  • Arbitrary File Manipulation (new)
  • Broken Authentication (expanded)
  • Broken Cryptography (expanded)
  • Cross-Site Scripting (XSS) (new)
  • Code Injection (new)
  • Hardcoded Sensitive Information (expanded)
  • Information Leak (new)
  • Insecure Communication (new)
  • Insecure Data Storage (expanded to cover missing or insufficient data protection cases)
  • JSON Injection (expanded)
  • XML Injection (new)
  • XPath Injection (new)
  • Log Forging (new)
  • Regular Expression Injection (new)
  • Security Misconfiguration (expanded)
  • Uncontrolled Format String (expanded)
  • Entry Points (expanded)

The mobile support is available in limited preview in Syhunt Community and fully available to new and existing customers through a separately licensed product extension known as Syhunt Mobile.

Additional Dynamic Improvements

Additional improvements made to Syhunt Dynamic include:

  • Added new crawling optimizations for heavily dynamically generated web sites.
  • Improved auto form filling of dynamically adjusted fields.
  • Expanded the brute force against the structure of the Start URL path.
  • Fixed: a Start URL redirect handling bug involving relative paths and improved an additional case of JS redirect handling.
  • Fixed: CVE reference not appearing for specific check groups.
  • Fixed: Compliance report template options for web apps not appearing when using non-Platinum Plus license.

Additional Code Checks & Improvements

  • Added additional XSS cases to Android checks.
  • Added new outdated Angular vulnerability checks (Prototype Pollution, DoS and multiple XSS vulnerabilities).
  • Added syntax highlighting of C/C++ files and analysis of C/C++ header files.
  • Fixed: false positive involving version number and hardcoded resource check.

Other Improvements

  • Added the ability to import targets and bookmarks from CSV and list files.
  • Changed the date/time format in the Past Sessions screen and report for better visualization.
  • Fixed: the user interface not highlighting when Git for Windows needs to be installed or about other fatal errors.
  • Fixed: Canceled scans sometimes being listed with Scanning as status in the Past Sessions screen.

We hope you enjoy the new release!