Cyber security

CyberSentry – Automated Web Vulnerability Scanner

CyberSentry is a robust automated scanning tool designed for web applications.

It helps security professionals, ethical hackers, and developers detect and resolve vulnerabilities to strengthen their web environments.

Features

  • Multiple Vulnerability Tests: Includes tests for SQL Injection, XSS, and HTTP Parameter tampering.
  • Extensive Coverage: Capable of scanning various frameworks and databases, including MySQL, PostgreSQL, NoSQL, PHP, and more.
  • Efficiency and Performance: Optimized for minimal resource usage while maintaining thorough scanning capabilities.
  • User-Friendly Outputs: Provides color-coded, real-time feedback for easy understanding and tracking of scanning progress.
  • Automated Reporting: Generates detailed reports outlining detected vulnerabilities, including severity and recommendations for mitigation.

Table Of Contents

  • Installation
  • Usage
  • Payload Configuration
  • Contributing
  • License
  • Contact

Installation

git clone https://github.com/yourusername/CyberSentry.git
cd CyberSentry
pip install -r requirements.txt

Usage

To start using CyberSentry, run the following command:

python3 CyberSentry.py

Follow the interactive prompts to select your target URL and the type of scans you wish to perform.

Payload Configuration

CyberSentry uses external files to manage payloads. To add or modify payloads, edit the corresponding text files in the payloads directory:

sqli_payloads.txt for SQL Injection payloads
xss_payloads.txt for XSS payloads
http_parameter_payloads.txt for HTTP Parameter payloads

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

2 days ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

2 days ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

4 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

5 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

3 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

4 weeks ago