Skip to content

exiv703/Shield-Eye-Core

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

8 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ›ก๏ธ ShieldEye Core

Professional Network Security Scanner

Real-time port scanning โ€ข CMS vulnerability detection โ€ข Security headers analysis

License: MIT Python GTK Nmap

Features โ€ข Quick Start โ€ข Screenshots โ€ข Documentation โ€ข Architecture


ShieldEye Core Dashboard


๐ŸŽฏ What is ShieldEye Core?

ShieldEye Core is a comprehensive network security scanner that identifies vulnerabilities, misconfigurations, and security risks across network infrastructure and web applications. It combines:

  • ๐Ÿ” Advanced port scanning with nmap integration for service detection
  • ๐ŸŒ CMS vulnerability detection with real CVE database integration
  • ๐Ÿ” Security headers analysis with weighted scoring (0-100)
  • ๐Ÿ–ฅ๏ธ Native GTK 4.0 desktop GUI with professional dark theme

Whether you're a security researcher, penetration tester, or system administrator, ShieldEye Core provides actionable insights into your network's security posture.


โœจ Key Features

๐Ÿ” Advanced Scanning

  • Flexible port ranges: Common, critical, full 1-65535, custom
  • Service detection: Version fingerprinting and banner grabbing
  • OS fingerprinting: Identify target operating systems
  • Network scanning: CIDR notation support (e.g., 192.168.1.0/24)
  • Stealth modes: Safe and aggressive scan profiles

๐ŸŒ Web Security Analysis

  • CMS detection: WordPress, Joomla, Drupal identification
  • CVE integration: Real-time vulnerability data from CIRCL API
  • Security headers: 10 headers analyzed with quality scoring
  • SSL/TLS analysis: Certificate validation and security grading
  • DNS enumeration: Subdomain discovery and DNSSEC checks

๐Ÿ“Š Professional Interface

  • Modern GTK 4.0: Native Linux desktop application
  • Dark theme: Cybersecurity-focused professional design
  • Real-time charts: Area charts, donut charts, radial gauges
  • Scan history: Persistent storage with trend analysis
  • Export reports: JSON format with detailed findings

๐Ÿ” Production-Grade Security

  • Input validation: Injection attack prevention
  • Rate limiting: Per-target and global request throttling
  • Custom exceptions: 9 specific error types
  • Comprehensive logging: Structured logging with file output
  • Test coverage: 50+ test cases with pytest

๐Ÿ–ผ๏ธ Screenshots

Dashboard Scan Configuration
Dashboard Scan Config
High-level security posture and activity Intuitive scan setup with multiple modes
Results History
Results History
Detailed findings with severity levels Scan timeline and trend analysis

๐Ÿ—๏ธ Architecture

ShieldEye Core uses a modular backend architecture with a native GTK frontend:

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                    GTK 4.0 Desktop GUI                        โ”‚
โ”‚                  (Python 3.10+ + PyGObject)                   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                              โ”‚ Direct Integration
                              โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                   ShieldEye Core Backend                      โ”‚
โ”‚              Orchestration โ€ข Validation โ€ข History             โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
        โ”‚                     โ”‚                     โ”‚
        โ–ผ                     โ–ผ                     โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ Port Scanner  โ”‚    โ”‚  CMS Scanner  โ”‚    โ”‚ SSL/DNS Scan  โ”‚
โ”‚    (Nmap)     โ”‚    โ”‚  (CVE Check)  โ”‚    โ”‚ (Certificate) โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
        โ”‚                     โ”‚                     โ”‚
        โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                   โ–ผ
    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
    โ”‚   CIRCL CVE API  โ€ข  Nmap Engine โ”‚
    โ”‚   (External)       (System)     โ”‚
    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Tech Stack

Layer Technology
Frontend GTK 4.0, Python 3.10+, PyGObject
Backend Python 3.10+, Nmap, Requests
Scanning python-nmap, BeautifulSoup4
Security OpenSSL, cryptography, dnspython
Reports ReportLab (PDF generation)
CVE Data CIRCL CVE Search API

๐Ÿš€ Quick Start

Prerequisites

Requirement Version Notes
Python 3.10+ With venv support
GTK 4.0+ Desktop environment required
Nmap Latest System installation required
Linux Any Arch, Ubuntu, Debian, Fedora tested

1. Clone and Install Dependencies

git clone https://github.com/exiv703/ShieldEye-Core.git
cd ShieldEye-Core

# Create virtual environment
python3 -m venv venv
source venv/bin/activate

# Install Python dependencies
pip install -r requirements.txt

2. Install System Dependencies

Arch Linux:

sudo pacman -S gtk4 python-gobject nmap

Ubuntu/Debian:

sudo apt update
sudo apt install libgtk-4-1 python3-gi nmap

Fedora:

sudo dnf install gtk4 python3-gobject nmap

3. Grant Nmap Permissions (Required)

Nmap requires elevated privileges for advanced scanning features. Grant capabilities once:

# Grant network capabilities to Nmap
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)

Alternative: Run the application with sudo (less secure):

sudo ./run.sh

4. Launch the GUI

# Activate virtual environment
source venv/bin/activate

# Run GUI
python run_gui.py

# Or make executable and run directly
chmod +x run_gui.py
./run_gui.py

5. (Optional) Use CLI Mode

# Port scan
python cli.py scan-ports --target 192.168.1.10 --port-mode common

# CMS scan
python cli.py scan-cms --url https://example.com --web-vulns

# Full scan
python cli.py full-scan --target 192.168.1.0/24 --url https://example.com

๐ŸŽฎ Using run.sh

ShieldEye Core includes a convenient launcher script for managing the application:

# Interactive menu
./run.sh

# Direct commands
./run.sh install    # Install dependencies
./run.sh gui        # Launch GUI
./run.sh test       # Run tests
./run.sh clean      # Clean cache and logs

โš™๏ธ Configuration

Configuration

Edit backend/config.py to customize scan parameters, security policies, and alert thresholds. See STRUCTURE.md for detailed configuration options.

Requirements

Core dependencies: python-nmap, requests, beautifulsoup4, PyGObject, cryptography, reportlab. See requirements.txt for full list.


๐Ÿ“– Documentation

Comprehensive documentation is available in the docs/ directory:


๐Ÿ”Œ API Usage

from backend import ShieldEyeBackend

backend = ShieldEyeBackend()

# Port scan
results = backend.scan_ports(
    target="192.168.1.10",
    port_mode="common",
    scan_mode="safe"
)

# CMS scan with CVE lookup
cms_result = backend.scan_cms(
    url="https://example.com",
    web_vulns=True
)

# Full scan (port + CMS)
full_result = backend.full_scan(
    target="192.168.1.10",
    url="https://example.com"
)

๐Ÿ› ๏ธ Development

# Clone and setup
git clone https://github.com/exiv703/ShieldEye-Core.git
cd ShieldEye-Core
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
pip install -r requirements-dev.txt

# Run tests
pytest
pytest --cov=backend --cov-report=html

๐Ÿค Contributing

Contributions are welcome! Please follow these guidelines:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

Code Style

  • Follow PEP 8 guidelines
  • Use type hints where appropriate
  • Add tests for new features
  • Update documentation

๐Ÿ“ License

This project is licensed under the MIT License - see the LICENSE file for details.

For educational and authorized security testing only.


๐Ÿ™ Acknowledgments

  • Nmap - Network scanning engine
  • CIRCL - CVE database API
  • GTK Project - GUI framework
  • Python Community - Amazing libraries and tools

๐Ÿ”— Related Projects

Part of the ShieldEye Security Toolkit series:

  • ShieldEye SurfaceScan - Web application surface scanner
  • ShieldEye ComplianceScan - Compliance and standards checker
  • ShieldEye NeuralScan - ML-powered threat detection

Built with โค๏ธ for the security community

Version 2.0.0 - Production Grade

Report Bug โ€ข Request Feature

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors