/HackSentry

This tool will be used for purple teaming engagements, scanning your whole network for known vulnerable endpoints.

Primary LanguagePython

HackSentry Logo

HackSentry

HackSentry is a Python script specifically designed to enhance the capabilities of purple teams in analyzing and testing the security of URLs and domains. The script empowers security analysts and penetration testers to identify potential vulnerabilities in web applications by performing various checks and manipulations on the provided URLs. By monitoring accessibility and tracking status codes, HackSentry offers critical insights to bolster the defense of your network.

Visitor Count: Visitor Count

Features

  • Validate the provided URLs for proper formatting and structure.
  • Check the status code of the URLs and domains to determine their accessibility.
  • Modify URLs by adding or replacing ports and paths for testing purposes.
  • Output the results to a specified file for record-keeping and analysis.

Installation

  1. Clone the repository to your local machine.
  2. Ensure you have Python 3 installed.
  3. Install the required dependencies: pip install -r requirements.txt.

Usage

python3 Sentry.py -u <url> -d <domains> -p <port> -w <wordlist> -o <output>

Replace the placeholders with your desired values:

: The single URL to be analyzed. : The file containing a list of domains to iterate through. : The port number for querying each URL. : The file containing endpoints to test against the URLs. : The output file for recording the results.

Examples

To check a single URL without any modifications:

python3 Sentry.py -u https://www.example.com

To check a list of domains from a file and output the results to a file:

python3 Sentry.py -d domains.txt -o output.txt

To check a single URL with a specified port and wordlist:

python3 Sentry.py -u https://www.example.com -p 8080 -w endpoints.txt

To check a list of domains with a specified port and wordlist and output the results to a file:

python3 Sentry.py -d domains.txt -p 443 -w endpoints.txt -o results.txt

Feel free to adjust the parameters based on your specific testing needs.

Contributing

Contributions are always welcome! If you have any improvements or feature suggestions, please feel free to create a pull request

License

This project is licensed under the MIT License - see the LICENSE file for details.