/sarenka

OSINT tool - gets data from services like shodan, censys etc. in one app

Primary LanguagePythonMIT LicenseMIT

sarenka-logo

Release release CircleCi release CircleCi release Platform release Platform release Python version CWE feed CVE feed license

♥ Free Software, requires only free accounts to third part services ♥

Lack of knowledge ... that is the problem.

William Edwards Deming

SARENKA is an Open Source Intelligence (OSINT) tool that helps you in obtaining and understanding Attack Surface.

The main goal is gathering information from search engines for Internet-connected devices (https://censys.io/, https://www.shodan.io/, https://www.criminalip.io/ko). It scrapes data about Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) and also has a database where CVEs are mapped to CWE.

It returns data about the local machine - local installed software (from Windows Registry), local network information (python libraries, popular cmd commads).

For now, the application also has simple tools like a hash calculator, shannon entropy calculator and very simple port scanner. More cryptography-math tools and reconnaissance scripts are planned.

The app is alive and has been rewritten from scratch on branch develop.

Contributors

Author Author Author

SARENKA was mentioned here:

Features

You can also:

  • calculate hashes based on user string
  • calculate shannon entropy based on user string
  • check is port open|closed (instead always use nmap if you can - it is slow)

Installation

Our team tests the application on Windows 10 and Kali Linux with Python 3.8.

SARENKA requires:

Clone repository
$ git clone https://github.com/pawlaczyk/sarenka.git
Go to application directory
$ cd ./sarenka
Create venv
$ python3 -m venv env
Activate venv

Powershell

$ ./env/Scripts/Activate.ps1

cmd

$ ./env/Scripts/activate.bat
Install requirements
$ pip3 install -r ./requirements.txt
Build application with sarenka.py script
$ python ./sarenka/sarenka.py

Getting started

####Please create accounts on services:

Application - default http://localhost:8000/
# go to sarenka/sarenka
$ python backend/manage.py runserver

#####Add user credentials at "Settings" sarenka-cwe

Screenshots

sarenka-main-harwdare

sarenka-cve

sarenka-windows-registry

sarenka-censys

sarenka-cwe

sarenka-swagger

Suggestions are welcome

  • Want some feature, other tool, library functionality?
  • Have any idea or question? alt text
  • Don't hesitate to contact Author .

Databases

Details in documentation.

Tech

And of course SARENKA itself is open source with a public repository on GitHub.

Planned features

  • Rewrite documentation in English (end of 2021)
  • trello/ github instead of Jira
  • Cover 100% code by tests
  • typing backend
  • document all functions and class
  • Docker
  • online demo
  • Jenkins
  • GraphQL
  • Selenium Scrapers
  • More pentesting tools
  • Google Dorks
  • Abstract Algebra calculator
  • Number Theory calculator
  • Server certificate validator
  • tests on Linux
  • NLP
  • d3js visualizations
  • alternative pure version for command line
CI/CD Tools

Tested manually

  • Kali Linux kali-rolling 2020.2; Python 3.8.2
  • Windows 10; Python 3.8.5

Documentation

Till end of March, 2021 documentation will be available only in Polish! The documentation is availabe here.

Authors

Author Author Author

Contact

Author

License

SARENKA is licensed under the MIT License.

Develop branch

sarenka-logo