ScopeSentry
→ View on GitHubAI Summary: Scope Sentry is a versatile cybersecurity tool that provides functionalities such as asset mapping, subdomain enumeration, vulnerability scanning, and information leakage detection. Its primary use case is to facilitate comprehensive security assessments of web assets through a distributed scanning approach, allowing users to configure multiple scanning nodes. Notably, it features a plugin system for extensibility, supports multi-node scanning, and includes components for web monitoring and sensitive data leakage detection.
README
English | 中文
Introduction
Scope Sentry is a tool with functions such as asset mapping, subdomain enumeration, information leakage detection, vulnerability scanning, directory scanning, subdomain takeover, crawler, and page monitoring. By building multiple nodes, users can freely choose nodes to run scanning tasks. When new vulnerabilities emerge, it can quickly check whether the concerned assets have related components.
Distributed Implementation Reference Articles: https://mp.weixin.qq.com/s/xfgRxUjljoQ8KzacblktxA
Server Recommendation: lightnode
Discord:
Language
Server:python - FastApi
Scan:go
Front-end:vue - vue-element-plus-admin
Website
- Official Website: https://www.scope-sentry.top
- Github: https://github.com/Autumn-27/ScopeSentry
- Scanner source code: https://github.com/Autumn-27/ScopeSentry-Scan
- UI source code: https://github.com/Autumn-27/ScopeSentry-UI
- Plugin Market: Plugin Market
- Plugin Template:https://github.com/Autumn-27/ScopeSentry-Plugin-Template
Install
git clone https://github.com/Autumn-27/ScopeSentry.git
cd ScopeSentry
# Change the MongoDB and Redis account passwords in the. env file.
docker-compose -f single-host-deployment.yml up -d
After running, there will be four containers: mongodb, redis, scope-sentry (server), and scopesentry-scan (scan). By default, there will be one scanning node.
View the initial user password and the secondary verification password of the plug-in
docker logs scope-sentry
Add new nodes(Optional)
git clone https://github.com/Autumn-27/ScopeSentry-Scan.git
cd ScopeSentry-Scan/build
# Edit the connection information for MongoDB and Redis in the .env file. NodeName is the node name, and each node name should be unique (if it is empty, it will be randomly generated, and you can change the name in the web interface).
docker-compose -f scan-docker-compose.yml up -d
Plugin Flowchart
Current Features
- Plugin System (Add any tool through extension)
- Subdomain Enumeration
- Subdomain Takeover Detection
- Port Scanning
- Asset Identification
- Directory Scanning
- Vulnerability Scanning
- Sensitive Information Leakage Detection
- URL Extraction
- Crawler
- Page Monitoring
- Custom WEB Fingerprint
- POC Import
- Asset Grouping
- Multi-Node Scanning
- Webhook
To Do
- Weak Password Cracking
Installation
For installation instructions, see the official website
Communication
Discord:
Screenshots
Login

Homepage Dashboard

Plugin System

Asset Data
Assets

Quick syntax search:

Root Domain

Subdomains

Subdomain Takeover

APP

小程序

URL

Crawler

Sensitive Information

Directory Scanning

Vulnerabilities

Page Monitoring

Projects

Project asset aggregation
Panel - Overview

Subdomains

Port

Service

Tasks

Task Progress

Nodes

#License
All branches of this project follow AGPL-3.0, and additional terms need to be followed:
- The commercial use of this software requires a separate commercial license.
- Companies, organizations, and for-profit entities must obtain a commercial license before using, distributing, or modifying this software. Individuals and non-profit organizations are free to use this software in accordance with the terms of AGPL-3.0.
- If you have any commercial license inquiries, please contact rainy-autumn@outlook.com .