Professional Network Security Scanner
Real-time port scanning โข CMS vulnerability detection โข Security headers analysis
Features โข Quick Start โข Screenshots โข Documentation โข Architecture
ShieldEye Core is a comprehensive network security scanner that identifies vulnerabilities, misconfigurations, and security risks across network infrastructure and web applications. It combines:
- ๐ Advanced port scanning with nmap integration for service detection
- ๐ CMS vulnerability detection with real CVE database integration
- ๐ Security headers analysis with weighted scoring (0-100)
- ๐ฅ๏ธ Native GTK 4.0 desktop GUI with professional dark theme
Whether you're a security researcher, penetration tester, or system administrator, ShieldEye Core provides actionable insights into your network's security posture.
|
|
|
|
| Dashboard | Scan Configuration |
|---|---|
![]() |
![]() |
| High-level security posture and activity | Intuitive scan setup with multiple modes |
| Results | History |
|---|---|
![]() |
![]() |
| Detailed findings with severity levels | Scan timeline and trend analysis |
ShieldEye Core uses a modular backend architecture with a native GTK frontend:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ GTK 4.0 Desktop GUI โ
โ (Python 3.10+ + PyGObject) โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Direct Integration
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ShieldEye Core Backend โ
โ Orchestration โข Validation โข History โ
โโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโ
โ โ โ
โผ โผ โผ
โโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโ
โ Port Scanner โ โ CMS Scanner โ โ SSL/DNS Scan โ
โ (Nmap) โ โ (CVE Check) โ โ (Certificate) โ
โโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโ
โ โ โ
โโโโโโโโโโโโฌโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ CIRCL CVE API โข Nmap Engine โ
โ (External) (System) โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
| Layer | Technology |
|---|---|
| Frontend | GTK 4.0, Python 3.10+, PyGObject |
| Backend | Python 3.10+, Nmap, Requests |
| Scanning | python-nmap, BeautifulSoup4 |
| Security | OpenSSL, cryptography, dnspython |
| Reports | ReportLab (PDF generation) |
| CVE Data | CIRCL CVE Search API |
| Requirement | Version | Notes |
|---|---|---|
| Python | 3.10+ | With venv support |
| GTK | 4.0+ | Desktop environment required |
| Nmap | Latest | System installation required |
| Linux | Any | Arch, Ubuntu, Debian, Fedora tested |
git clone https://github.com/exiv703/ShieldEye-Core.git
cd ShieldEye-Core
# Create virtual environment
python3 -m venv venv
source venv/bin/activate
# Install Python dependencies
pip install -r requirements.txtArch Linux:
sudo pacman -S gtk4 python-gobject nmapUbuntu/Debian:
sudo apt update
sudo apt install libgtk-4-1 python3-gi nmapFedora:
sudo dnf install gtk4 python3-gobject nmapNmap requires elevated privileges for advanced scanning features. Grant capabilities once:
# Grant network capabilities to Nmap
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)Alternative: Run the application with sudo (less secure):
sudo ./run.sh# Activate virtual environment
source venv/bin/activate
# Run GUI
python run_gui.py
# Or make executable and run directly
chmod +x run_gui.py
./run_gui.py# Port scan
python cli.py scan-ports --target 192.168.1.10 --port-mode common
# CMS scan
python cli.py scan-cms --url https://example.com --web-vulns
# Full scan
python cli.py full-scan --target 192.168.1.0/24 --url https://example.comShieldEye Core includes a convenient launcher script for managing the application:
# Interactive menu
./run.sh
# Direct commands
./run.sh install # Install dependencies
./run.sh gui # Launch GUI
./run.sh test # Run tests
./run.sh clean # Clean cache and logsEdit backend/config.py to customize scan parameters, security policies, and alert thresholds. See STRUCTURE.md for detailed configuration options.
Core dependencies: python-nmap, requests, beautifulsoup4, PyGObject, cryptography, reportlab. See requirements.txt for full list.
Comprehensive documentation is available in the docs/ directory:
- README_GUI.md - Detailed GUI usage guide
- STRUCTURE.md - Project architecture and organization
- FINAL_STATUS.md - Production-grade features overview
from backend import ShieldEyeBackend
backend = ShieldEyeBackend()
# Port scan
results = backend.scan_ports(
target="192.168.1.10",
port_mode="common",
scan_mode="safe"
)
# CMS scan with CVE lookup
cms_result = backend.scan_cms(
url="https://example.com",
web_vulns=True
)
# Full scan (port + CMS)
full_result = backend.full_scan(
target="192.168.1.10",
url="https://example.com"
)# Clone and setup
git clone https://github.com/exiv703/ShieldEye-Core.git
cd ShieldEye-Core
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
pip install -r requirements-dev.txt
# Run tests
pytest
pytest --cov=backend --cov-report=htmlContributions are welcome! Please follow these guidelines:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
- Follow PEP 8 guidelines
- Use type hints where appropriate
- Add tests for new features
- Update documentation
This project is licensed under the MIT License - see the LICENSE file for details.
For educational and authorized security testing only.
- Nmap - Network scanning engine
- CIRCL - CVE database API
- GTK Project - GUI framework
- Python Community - Amazing libraries and tools
Part of the ShieldEye Security Toolkit series:
- ShieldEye SurfaceScan - Web application surface scanner
- ShieldEye ComplianceScan - Compliance and standards checker
- ShieldEye NeuralScan - ML-powered threat detection
Built with โค๏ธ for the security community
Version 2.0.0 - Production Grade



