Skip to content

Latest commit

 

History

History
40 lines (29 loc) · 2.71 KB

README.rst

File metadata and controls

40 lines (29 loc) · 2.71 KB

Zentinel

Documentation Status https://codecov.io/gh/symonk/zentinel/branch/master/graph/badge.svg?token=E7SVA868NR

Zentinel

Zentinel is a simple python port scanner with no dependencies. It is written on top of asyncio and it's sole purpose is for administrators or blue teams to quickly inspect their servers or infrastructure for unexpected open ports. Currently zentinel performs a complete 3 way TCP handshake and connection on every port SYN >> SYN-ACK >> ACK, However it is lightning fast as it bypasses all the blocking IO involved in the network / socket communication. Compared to a threaded model the results are astonishing. For anything more powerful I would recommend the awesome nmap as it offers a massive range of functionality. This project was used for me to improve my knowledge of async concepts. Please read the legal disclaimer below. Zentinel is not permitted for use in an offensive capacity or for scanning ANY infrastructure in which the person using it does not have full written consent to do so.


Legal Disclaimer

The use of code contained in this repository, either in part or in its totality, for engaging targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws.

Developers assume no liability and are not responsible for misuses or damages caused by any code contained in this repository in any event that, accidentally or otherwise, it comes to be utilized by a threat agent or unauthorized entity as a means to compromise the security, privacy, confidentiality, integrity, and/or availability of systems and their associated resources by leveraging the exploitation of known or unknown vulnerabilities present in said systems, including, but not limited to, the implementation of security controls, human- or electronically-enabled.

The use of this code is only endorsed by the developers in those circumstances directly related to educational environments or authorized penetration testing engagements whose declared purpose is that of finding and mitigating vulnerabilities in systems, limiting their exposure to compromises and exploits employed by malicious agents as defined in their respective threat models.