This is a Cyber Security project, This project is intended to be a tool to gather informations and analyse Targets. and will present the data in a Cyber Security Manner.
This tool provides a cyber security analyst with tools to gather informations and evaluate the security aspects of a target. be it a person or a system or everything in between.
This project provides the following services to it's users:
This tool evaluats two main aspects of the internet connection for the current user using our system, which are:
-> security level: this shows if your connnection is secure or not (based on proxy/vpn relays existance)
-> risk level: this tells you the likelyhood of you being flagged by secure web services (like: bank website, goverment sites etc...). this is true for the webservices that use fraud protection measures.
This tool permitts you to gether various informations about your target, this uses the surper API from google to execute search operations, and return breaif results (on the Google search engine)
This determins the assocaited ipv4 addresses of a given host name.
This Shows the HTTP headers that your client sends when connecting to a webserver. (importing to know how much data youreveal about your self.)
One of the most important steps to gather informations about a target is to observe the history of the assigned ip addresses, This is important in forensics analysis.
A simple tool to show your Ip address as seen in the internet.
A web scanning service to scan your target for open ports that corresponds to a service you can exploit. provide eaither an ip address in case of a server or a domain name in case of webservers.
In this service we show data provided to us by the public API of cve-search and it is operated by CIRCL (Computer Incident Response Center Luxembourg).
-> Explore the vendors that have security vulnerabilities discovered in them. (both now and in and in the past).
-> Explore the affected products of a given vendor that has the security vulnerabilities discovered in them.
This tool fetch the databases to retrieve details about the CVE-ID the user provided.
A CVE ID (i.e: CVE-xxxx-xxxxx), ex: (CVE-2021-40488) [a public vulnerability in a microsoft product].
-> Get more informations about the current vulnerabilities databases. (the ones used in this system).
-> ViewDns
-> Surper
-> circl.lu (Computer Incident Response Center Luxembourg)
start the back-end by going to the back-end folder and typing: $ python3 -m api.v1.app
to start the front-end app, to to the front-end folder and type: $ npm install | npm start
-> The flask application requires few additional libraries including:
to install flask,
to install flask_cors,
and to install sql_alchemy,
etc... (errors will notify you of the required packages) [hhhhh]
-> and for the React app it's enought to run this command at the root of the front-end of the app: $ npm install
python,
flask,
MongoDb / Mysql, [was intended for usser auth data storage, but not implemented yet, planned to be implemented in later versions]
JSON storage (file). [as an alternative storage system for hosts that prefer to not have a database system installed]
React,
Javascript / typescript,
This application required three invarement variables to function normally. these variables holds the deffirent api keys that goes with each request:
VIEW_DNS_KEY => https://viewdns.info
SERPER_API_KEY => google.serper.dev (https://serper.dev [as a web site])
IP_HUB_KEY => http://iphub.info/
You can set these variables by creating an account on their respective websites then get your key and use this command:
$ export [variable_name]=[variable value (make sure to use '' (as these values are strings, and no space around the '='))]
Note: Because of time constraints I haven't implemented a real authentication system, this app can be accessed via these credentials:
email/username: admin@cyberscanamch.com || cyber_admin
password: admin20240711
