SARENKA is an Open Source Intelligence ( OSINT ) tool that helps you acquire and understand Attack Surface.
The main purpose is to collect information from search engines for devices connected to the Internet ( https://censys.io/ , https://www.shodan.io/). It displays data on the common vulnerabilities and vulnerabilities (CVE), common weakness (CWE) and also has a database where CVEs are mapped to CWEs.
Returns data on the local machine - locally installed software (from the Windows registry), local network information (python libraries, popular cmd commands).
Currently the app also features simply tools, such as hash calculator, shannon entropy calculator and very simple port scanner. More tools will be added cryptographys-mathematics and scripts recognitions.
Specifications
- receives data from https://censys.io/ via ip
- data from https://www.shodan.io/ via ip
- download data DNS
- download data WHOIS
- banner grabbing
- find CVEs from C.W.E.
- pdf for reports
You can also:
- calculate hashes string base
- calculate the shannon entropy based on the user string
Installation
SARENKA requires:
Download from repository
$ git clone https://github.com/pawlaczyk/sarenka.git
Go to the source list
$ cd sarenka / sarenka
We run sarenka.py
$ python sarenka.py
Getting started
#### Create accounts for the following services:
Running a backend application - default http://localhost:8000 /
# go to sarenka / sarenka $ python backend / manage.py runserver
Run frontent application - default http://localhost:3000/
# go to sarenka/sarenka/frontend folder $ npm start
Application snapshots
You can download it program from here.