SARENKA is an Open Source Intelligence (OSINT) tool that helps you acquire and understand Attack Surface.
The main purpose is to collect information from search engines for devices connected to the Internet ( https://censys.io/ , https://www.shodan.io/). Displays data on Common Vulnerabilities and Exposures (CVE), Common Weakness (CWE) and also has a database where CVEs are assigned to CWE.
Returns data on the local machine - locally installed software (from the Windows registry), local network information (python libraries, popular cmd commands).
At the moment the application also has simple tools such as hash calculator, shannon entropy calculator and very simple port scanner. More cryptography-math tools and authentication scripts will be added.
- receives data from https://censys.io/ via ip
- data from https://www.shodan.io/ via ip
- download data DNS
- download data WHOIS
- banner grabbing
- find CVEs from CWE
- pdf for reports
You can also:
- calculate hashes string base
- calculate the shannon entropy based on the user string
Download from repository
$ git clone https://github.com/pawlaczyk/sarenka.git
Go to the source list
$ cd sarenka/sarenka
We run sarenka.py
$ python sarenka.py
#### Create accounts for the following services:
Running a backend application - default http://localhost:8000 /
# go to sarenka/sarenka
$ python backend/manage.py runserver
Run frontent application - default http://localhost:3000/
# go to sarenka/sarenka/frontend folder
$ npm start
You can download the program from here.