How does it works
Discover How Our Cutting-Edge Technology Keeps You Secure
See Our Security in Action:
Watch the Demo Now!
Let’s make the world safer, together.
CYTRIX scanner is helping all businesses, both SMBs and enterprises, to test their online assets and products for over 9000 vulnerabilities.
CYTRIX’s mission is to make penetration testing accessible for all. Individuals, small and large companies a like.
Backed by professional cyber security experts holding the same vision and offering their services through CYTRIX.
What makes CYTRIX special?
What truly makes us unique is the power that you have been given your hands. CYTRIX allows you to map your weakest points in your web assets, align them by their severity and adjust the fixing to the most urgent vulnerabilities.

More than that, CYTRIX aims to achieve only legitimate exploitable vulnerabilities using the “Monitoring” System, so you won’t waste your time.
We hold more than 15,000 CVE’s, Over 9000 vulnerabilities and etc..
Exploitation
CYTRIX presents an accurate payload of exploit that was used during our scans, which also includes clear instructions that will allow you to perform the same exploitation by yourselves in order to learn about it better.

Single Page Application (SPA)
-
We are proud to say that our web scanner is the only tool that has the option of scanning SPA websites!
Speed
We use new methods combined with a powerful automation process to reduce server resources and complete the scan at extremely high speeds.
So what’s the story behind CYTRIX?
Three years ago, we would do everything manually, Penetration Testing/investigations, and extract information.
To do several things at the same time we needed more manpower and also pay money to a lot of different companies for a number of different tools. So Sahar Avitan & Eden Zaraf started working on “CYTRIX”.
Today the tool is able to scan quickly, efficiently, prevent a large number of False positives from other competitors, to exploit vulnerabilities at the highest level.
and most importantly? User-friendly, and goes over every piece of information that exists in assets. In short, join us.
Frequently Asked Questions
How to connect / log in to CYTRIX’s Web Application Vulnerability Scanner?
If you’re in the main site (https://cytrix.io/), click on “LOGIN” located in the main navigation bar.
A quick Overview of CYTRIX
Logging In
What is a ‘Target’?
‘Targets’ are URLs that you wish to Scan.
For example: https://mywebsite.com is a Target.
What can I do with CYTRIX?
Kayran allows you to stay protected from unknown security vulnerabilities that could be “hiding” in your online assets. Besides that, Kayran will generate a full report displaying the vulnerabilities found and how to fix them, so you can patch, upgrade and stay protected while continue doing your best work.
What makes CYTRIX unique?
Kayran is able to scan and find vulnerabilities in sites that no tool can find, such as SPA sites, in addition, Kayran exploits any ZERO DAY vulnerability that exists – and most importantly the high-speed relative to the market.
Do I need to download any particular software in order to use Kayran?
No! Kayran is a tool that runs on your browser, just make sure your browser is supported and updated.
Is it hard to operate?
In fact, Kayran was designed to be user-friendly and easy to use even for people without technical knowledge. Introduction to Kayran’s Dashboard
I’m not sure if CYTRIX is for me, can I hear more?
Sure you can! just schedule a meeting through here, we’ll have a “Demo” meeting, showing and explaining everything about Kayran.
Will CYTRIX share our data?
Kayran does not give any third-party direct or indirect access to the customer’s data except at your directive or when it’s required by law.
Is there an extensive guide on using Kayran?
You can use our Support.
Support
What is a EULA? Why do I need to Read and Agree to it?
EULA stands for end-user license agreement. A EULA specifies in detail the rights and restrictions which apply to the use of the software. Reading and Agreeing to it means that you agree to everything written in it and that you are legally required to do so.
Can CYTRIX hurt my assets ?
Kayran has a dedicated system that knows how to keep your assets secure, the systems will not fall at any stage, and the exploitation of the vulnerabilities will not harm the information or the site.
What kind of information does CYTRIX store after a scan?
Kayran will display the targets got scanned, vulnerabilities it detected, requests and so on – only to the user/client using the server.
Which browsers support CYTRIX?
Every browser.
If you encounter any compatibility issues, please contact us.
Will CYTRIX overload my server?
No, Kayran has a special “Speed” engine which will detect when a overload is potential, and preventing it by dynamically changing the number of requests it will send.
Can I upgradechange my pricing plan?
Of course! just contact us via your given contact mail or leave a message.
How do we Initiate New Scans using Kayran?
There are two ways to do that:
- Using the Quick Scan in the Dashboard, which will create a “simple”, modifier-free scan.
- Using the New Scan under Scan so that we can define everything we want to be used in the scan in a more detailed way.
Can I concentrate several scans together?
Yes! simply create a new Project (Projects → New Project) and then, when initiating the scan, select your desired Project (Settings → Project).
How to Associate Scans with Projects
Is there a way I can perform certain actions automatically? (using an API)
Yes! by using our API Documentation!
I have a problem that I can not solve on my own, what should I do?
Problem? no problem! simply tell us through the “Report A Problem” section found in Kayran’s main menu, or, mail us at [email protected]
Support
Report A problem
My website is a SPA (Single-Page-Application) configuration based, can Kayran Scan it?
Yes! and currently, Kayran is the only tool that can do it!
Can CYTRIX scan assets locally?
Of course! by using a Proxy.
Creating and Setting up Proxy Profiles
Do I need to stay Logged in after Initiating a Scan?
No! After initiating a Scan, as long as your Server is active, it will continue without requiring you to stay logged in. You can even turn off your device!
How severe is the vulnerability found during the scan?
The vulnerabilities that Kayran has detected will be categorized according to their level of severity and the level of potential damage they may cause, when the lowest severity is Informative and the highest, is High.
When will my queued scans be activated?
If you initiate a new scan with multiple targets, they will be moved to the active scans section according to the plan you’ve purchased (if none of them will be moved, you’ve either ran out of domains or exceeded the number of active scans you’re allowed).
Queue Sub-Section
I think that one of the vulnerabilities found during the scan is incorrect / non-existent?
Mark the vulnerability as FalsePositive and we will check it out as soon as possible!
How to mark FalsePositive
What do I do in case my site have advanced login methods like Captcha and so on?
Simple! you can create and use our highly advanced “Self Login” method.
Self Login
Can I use my own Fixed IP?
Yes, simply create a new Proxy using it.
Creating and Setting up Proxy Profiles
Does CYTRIX works with Shodan?
Yes! learn more about it below :
Using Shodan
How can I perform the scans using one fixed IP address?
You can either use your own by creating a proxy Creating and Setting up Proxy Profiles
Or, you can get one from us Requesting a Fixed IP
Can I add more users to my server?
Yes, and you can also define certain roles for each of them.
Adding Users to your Server
How many Users can be Created on my Server?
There’s NO LIMIT on the number of Users you can add to your Server.
How can I change my Personal Details such as my Password?
To change your personal details, use the Profile section.
Here’s how.
Can I Edit users on my Server?
Yes.
Managing User profiles in your Server
Can I remove users from my server?
Yes.
Deleting Users from you Server
What are the Differences between the Roles of Users?
There are 4 Types of Roles for users in Kayran. Each with its own Privileges and Capabilities.
To learn more – Roles Explained
Can I import scan summaries?
Yes, for more information, read our Reports section in Support
Reports
I accidentally created a scan and forgot to attach it to a certain project, can I do this later?
Yes, you can attach scans to projects in each stage it goes through (even after being completed).
How to Associate Scans with Projects
Can I be Notified of Scans that were Aborted?
Yes, you can set it up in your Profile. Just toggle “On Aborted” on.
Setting up Email Notifications
Can I be Notified of Completed Scans?
Yes, you can set it up in your Profile. Just toggle “On Change Status Scan” on.
Setting up Email Notifications
Can I be Notified of Scans that were Stopped?
Yes, you can set it up in your Profile. Just toggle “On Stop” on.
Setting up Email Notifications
Can I be Notified on Scans that were moved from the Queue to the Active Scans?
Yes, you can set it up in your Profile.
Setting up Email Notifications
Can I be Notified when my Scheduled Scans gets Initiated?
Yes, you can set it up in your Profile.
Setting up Email Notifications
I don’t like the login’s token I received, can I change it?
Yes, simply navigate to the “Server Settings” and, change it there.
For more information, read here :
How to Change my Login Token
What Integrations does CYTRIX work with?
We have a number of Integration which users can use in Kayran such as Shodan and Microsoft Teams.
The Integration Support section is being updated as they are.
Which Modifiers can be set for a Scan I will Initiate?
There are many Modifiers you can set. From the Description to the Proxy being used.
To learn more about Modifiers.
Which Settings can I change for a Scan After it has started?
Currently, you can change the Description, Project, Speed and Level Deep (if defined manually) and Jira Project.
Use our Support to learn more.
Can I use CYTRIX to Scan APIs?
Yes. By uploading your API’s Schema, Kayran can Scan and Detect Vulnerabilities in it.
Where can I view all the Changes/Updates coming in following System Updates?
Each Release, Kayran’s clients gets an Email listing all changes. You can also view them here.
Can I Create another Scan of the same Target with the same Modifiers?
Yes, you can do it Manually, or, you can use the Duplicate function located in the table in Scans.
What is Enumeration?
Enumeration is the act of “Brute Forcing”, overloading the server by “Inserting” random Parameters and Paths used for testing.
Use it in the Crawler tab when initiating new scans.
Pay attention that enabling Enumeration Significantly extends the Scan’s Duration.