SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface.
The main goal is to gathering infromation from search engines for Internet-connected devices (https://censys.io/, https://www.shodan.io/). It scraps data about Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) and also has database where CVEs are mapped to CWE.
It returns data about local machine – local installed softwares (from Windows Registry), local network information (python libraries, popular cmd commads).
For now application has also simple tools like hash calcualtor, shannon entropy calculator and very simple port scanner. More cryptography-math tools and reconnaissance scripts are planned.
Look
https://raw.githubusercontent.com/pawlaczyk/sarenka_tools/master/cwe_all.json
In progress
In progress
Installation
Description in progress Sarenka is local web application for Windows.
Rirst release gathers data from two search engines. example sarenka/backend/connectors/credentials.json
{ "censys": { "base_url": "https://censys.io/", "API_ID": "<my_user>", "Secret": "<my_api_key>", "API_URL": "https://censys.io/api/v1" }, "shodan": { "base_url": "https://www.shodan.io/", "user": "<my_user>", "api_key": "<my_api_key>" } }
Features
Database
This is tricki part, because we have 863 sqlite3 database files: default, CWE-NONE (some CVE hasn’t cwe_id eg.: CVE-2013-3621) and 861 individual for CWEs
Tech
It uses a number of open source projects to work properly on:
And of course SARENKA itself is open source with a public repository on GitHub.
Planned Features
CI/CD Tools
Tests
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…