Free Software, requires only free accounts to third part services
Lack of knowledge ... that is the problem.
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface.
The main goal is gathering information from search engines for Internet-connected devices (https://censys.io/, https://www.shodan.io/). It scraps data about Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) and also has database where CVEs are mapped to CWE.
It returns data about the local machine - local installed software (from Windows Registry), local network information (python libraries, popular cmd commads).
For now application has also simple tools like hash calculator, shannon entropy calculator and very simple port scanner. More cryptography-math tools and reconnaissance scripts are planned.
App is alive and has been rewriting from scratch on branch new_master.
You can also:
Team tests application on Windows 10 and Kali Linux with Python 3.8.
SARENKA requires:
$ git clone https://github.com/pawlaczyk/sarenka.git
Powershell
$ ./env/Scripts/Activate.ps1
cmd
$ ./env/Scripts/activate.bat
$ pip3 install -r ./requirements.txt
$ python ./sarenka/sarenka.py
####Please create accounts on services:
# go to sarenka/sarenka
$ python backend/manage.py runserver
#####Add user credentials at "Settings"
Details in documentation.
And of course SARENKA itself is open source with a public repository on GitHub.
Till end of March, 2021 documentation will be available only in Polish! The documentation is availabe here.
SARENKA is licensed under the MIT License.
Original repository: https://github.com/pawlaczyk/sarenka