What is Kayran

Cytrix scanner is helping all businesses, both SMBs and enterprises, to test their online assets and products for over 30,000+ vulnerabilities.
Cytrix’s mission is to make penetration testing accessible for all backed by professional cyber security experts holding the same vision and offering their services through Cytrix.
Let’s make the world safer, together.

Cytrix web scanner Dashboad
Dashboard

WHAT MAKES CYTRIX SPECIAL ?

Cytrix allows you to map weakest points in your web architecture, sort them by severity level and implement patching of the most urgent vulnerabilities first.
With one of the lowest false positive rates in the industry, Cytrix pinpoints only legitimate exploitable vulnerabilities using our “Monitoring” System, so you won’t waste time double checking the results.
We currently support over 30,000 vulnerabilities including 10,000 relating to WordPress.

Exploitation

Cytrix presents an accurate payload of exploit that was used during our scans, which also includes clear instructions which allow you to replicate the exploitation by yourselves in order to learn about it better.

Cytrix Full exploitation
Full Exploitation

Single Page Application (SPA)

We are proud to say that our web scanner is the only tool that has the option of scanning SPA websites!

Speed

We use new methods combined with a powerful automation process to reduce server resources and complete the scan at extremely high speeds.

So what’s the story behind Cytrix?

Three years ago, we did everything manually, Penetration Testing/investigations, and information extraction.

To multitask, we needed more manpower and a wide range of different tools.
So Sahar Avitan & Eden Zaraf started working on “Cytrix”.

Today the tool is able to scan quickly, efficiently, prevent a large number of False positives from other competitors, and exploit vulnerabilities at the highest level.

Cytrix is extremely user-friendly, and goes over every piece of information that exists in assets.
In short, join us.

Blue Team

We’ve talked about The Red Team before, but what about The Blue Team? How is this group different from the red one? Why would we

Read More »

Explaining API

We’ve talked about API’s Vulnerability in here, but i feel like there’s much more to talk about and explain since this is a big and

Read More »