Shuriken is a suite that manages a set of system audit tools. This proyect is the result of the final project of master in Cybersecurity and Management studied in UPC School.
The project has three main branches: the first one is Python Crawler based on Scrapy Crawler, the second one is R Shiny WebApp that use Net.Security package and the third is a tool to manage an instance of OpenVas
Given these three tools, it allows you to extract information about system vulnerabilities and then you can view the results in an organized way. It allows two ways of extracting data, using the crawler or openvas. To visualize them integrates a dashboard that relates the results.
The Crawler have three modules that run consecutively to extract information at the web level as protocol level and open ports as well as physical location:
It has been tested on Kali Linux systems
For installation it is necessary:
It is also necessary to have installed in the sistem: Scrapy, Nikto, Nmap, GeoIP, Wig, OpenVas.
At the moment a setup file has not been generated so it is necessary to manually install the following package of Python and R.
Python packages:
- colored
- cvs
- nmap
- scapy
- logging
- GeoIP
- scrapy
R packages:
- shiny
- shinydashboard
- ggplot2
- leaflet
- XML
- stringr
- dplyr
- tidyr
- rworldmap
- net.security
If everything went correctly, to run shuriken you have two options or deliver execution privileges to the init_Shuriken.py file or run it as python script. After the execution Shuriken is presented thus: