Python security scanner with pentest mode - audit your website, API, or server
Project description
๐ Security Audit Tool
One command to audit your website, API, or server. Built for business owners who care about security.
Python security scanner with defensive checks + active pentest mode. Find vulnerabilities, test performance, and generate professional reports for your business.
A Python-based security assessment tool that helps you identify vulnerabilities, performance issues, and security misconfigurations in your own systems. Perfect for business owners, developers, and DevOps teams who want to proactively secure their infrastructure.
โ ๏ธ Legal Notice
For authorized security testing only. Use exclusively on:
- Systems you own
- Systems you have explicit written permission to test
Unauthorized scanning may violate laws. By using this tool, you confirm proper authorization.
๐ What This Tool Does
This tool performs two types of security assessments:
1. Defensive/Read-Only Checks (Safe)
- Scan file permissions, services, firewall rules
- Detect hardcoded secrets in code
- Check TLS certificates, container configs
- Analyze dependencies for known vulnerabilities
2. Active/Pentest Checks (Sends Traffic)
- Performance testing: Measure response times
- Vulnerability scanning: Test for SQL injection, XSS
- Load testing: Simulate traffic to test capacity
๐ก Perfect For
| Use Case | What You Get |
|---|---|
| Business Owner | Know if your website has security holes |
| Developer | Find secrets in code before committing |
| DevOps/SRE | Test if your servers can handle traffic spikes |
| Security Team | Quick first-line vulnerability assessment |
| Compliance | Generate audit reports for security reviews |
๐ ๏ธ Quick Start (5 minutes)
1. Install
Option A: From PyPI (Recommended)
pip install cache-wraith-audit-tool
Option B: From Source
git clone https://github.com/cachewraith/security_audit_tool.git
cd security_audit_tool
pip install -e .
2. Run Your First Scan
# Simple command - full security audit
./audit --url https://your-website.com --full-scan
This creates:
security_audit_20250423_184904.html- Professional HTML reportsecurity_audit_20250423_184904.json- Machine-readable JSON- Terminal output with colorized findings
3. View Results
# Open the HTML report
firefox security_audit_*.html
๐ Common Commands
Basic Scanning
# Scan any website
./audit --url https://example.com --full-scan
# Scan your local system
./audit --local --full-scan
# Scan a project directory
./audit --path ./my-project --full-scan
# Scan multiple websites
./audit --url https://api1.com --url https://api2.com --full-scan
Pentest Mode (Active Testing)
# Full pentest with performance, vulnerability, and load tests
./audit --url https://your-business.com --pentest-mode --full-scan
# Just vulnerability scan (SQLi, XSS tests)
./audit --url https://your-api.com --enable-vulnerability-scan
# Performance test only
./audit --url https://your-api.com --enable-performance-test
# Load test (simulates traffic - use with caution!)
./audit --url https://your-api.com --enable-load-test
โ ๏ธ Pentest features send actual traffic to your target. Only use on your own systems.
๐ What Gets Checked
By Default (Safe, Read-Only)
- โ File/directory permissions
- โ Running services and open ports
- โ Firewall configuration
- โ Hardcoded secrets in code
- โ Outdated dependencies with known CVEs
- โ Docker/container security
- โ Web application configuration
With --full-scan
- โ Everything above, plus:
- โ TLS/SSL certificate validation
- โ Performance testing
- โ Vulnerability scanning (SQLi, XSS)
With --pentest-mode
- โ Everything above, plus:
- โ Load testing / DDoS simulation
๐ Output Formats
| Format | File Extension | Use Case |
|---|---|---|
| Terminal | - | Quick review during development |
| HTML | .html |
Share with team, management, compliance |
| JSON | .json |
CI/CD integration, automation, archiving |
๐๏ธ For Developers (Architecture)
Want to extend the tool? Here's how it's structured:
app/
โโโ cli.py # Command-line interface
โโโ main.py # Entry point and orchestration
โโโ config.py # Configuration management
โโโ scope.py # Target validation and scoping
โโโ checks/ # Security test implementations
โ โโโ base.py # Base class for all checks
โ โโโ permissions_check.py
โ โโโ vulnerability_check.py # SQLi, XSS tests
โ โโโ performance_check.py
โ โโโ load_test_check.py # DDoS simulation
โโโ collectors/ # Data gathering modules
โโโ report/ # Output generators (JSON, HTML, Terminal)
โโโ utils/ # Rate limiting, timeouts, validators
Adding a New Check
- Create
app/checks/my_check.py - Inherit from
BaseCheck - Implement
run()method - Register in
app/checks/__init__.py
from .base import BaseCheck, CheckResult
from ..models import SeverityLevel
class MyCheck(BaseCheck):
check_id = "my_check"
check_name = "My Security Check"
def run(self) -> CheckResult:
result = self._create_result()
# Your check logic here
finding = self._create_finding(
title="Example issue",
severity=SeverityLevel.MEDIUM,
target="example.com",
evidence="Found issue X",
remediation="Fix by doing Y"
)
result.findings.append(finding)
return self._finish_result(result)
Running Tests
# Install dev dependencies
venv/bin/pip install -e ".[dev]"
# Run tests
venv/bin/pytest
# Run with coverage
venv/bin/pytest --cov=app
๐ Documentation
| Document | What's Inside |
|---|---|
docs/RUN.md |
How to install and run the tool |
docs/COMMANDS.md |
All available commands and examples |
docs/PENTEST.md |
Pentest mode guide for active testing |
docs/FEATURES.md |
Feature list and what each check does |
docs/ARCHITECTURE.md |
Code structure for developers |
docs/TROUBLESHOOTING.md |
Common issues and solutions |
๐ Safety Features
- Explicit Scope Required - Tool won't run without defined targets
- Authorization Prompt - Legal confirmation required
- Rate Limiting - Built-in request throttling
- Read-Only by Default - No modifications to target systems
- Opt-in Active Tests - Pentest features must be explicitly enabled
- Auditable - All actions logged
๐ CI/CD Integration
# .github/workflows/security.yml
name: Security Scan
on: [push, pull_request]
jobs:
security:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Setup
run: |
python -m venv venv
venv/bin/pip install -e .
- name: Run Security Audit
run: ./audit --url https://staging.your-app.com --full-scan
- name: Upload Report
uses: actions/upload-artifact@v3
with:
name: security-report
path: security_audit_*.html
๐ฏ Roadmap
- CIS Benchmark compliance checks
- SBOM generation (CycloneDX, SPDX)
- Kubernetes security scanning
- API endpoint fuzzing
- Compliance mapping (NIST, PCI-DSS, SOC2)
๐ค Contributing
Contributions welcome! Please ensure:
- All checks are defensive and non-destructive by default
- Code includes type hints
- Tests included for new functionality
- Documentation updated
๐ License
MIT License - See LICENSE file for details.
Built with โค๏ธ for business owners who take security seriously.
Got questions? Open an issue or check the docs/ folder.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cache_wraith_audit_tool-1.0.0.tar.gz.
File metadata
- Download URL: cache_wraith_audit_tool-1.0.0.tar.gz
- Upload date:
- Size: 83.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d844cc2892ebfe902f13153eabb8bba881097b22eff319f4dbf506ae61d846a6
|
|
| MD5 |
cc371543e0721348a6257ccb3a198c2b
|
|
| BLAKE2b-256 |
25d7f518e29ed46b3d6f1110561b40f99b557242440835bf57dadccd7c0af530
|
File details
Details for the file cache_wraith_audit_tool-1.0.0-py3-none-any.whl.
File metadata
- Download URL: cache_wraith_audit_tool-1.0.0-py3-none-any.whl
- Upload date:
- Size: 89.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
659c73b74f4abfe6a14578eefa36617a5532eeba869170a221c54c3012c035a8
|
|
| MD5 |
515aa036d9cf63df21f9097d927e0b1b
|
|
| BLAKE2b-256 |
4ec88829f53bdf0556f6e7a684107426cc107fe7e6c38e594b19a295889eb63d
|