Skip to main content

Scan Safety Prediction System - Predict blocking/rate-limiting before scanning

Project description

is-it-safe 🛡️

PyPI version Python versions License: MIT

Stealthy Security Layer Fingerprinting & Detection v5.0

is-it-safe is a modern, high-performance security utility designed to map and identify protective layers surrounding a target without triggering aggressive defense mechanisms. It provides deep visibility into infrastructure security by fingerprinting WAFs, IDS/IPS, and automated blocking systems.

Key Features

  • 🛡️ WAF Fingerprinting: Identifies 10+ major WAF vendors (Cloudflare, Akamai, AWS, Imperva, etc.) via signature-based and behavioral analysis.
  • 🕵️ Stealth-First Detection: Implements adaptive jitter, randomized headers, and low-signal request patterns to bypass basic rate-limiters and heuristics.
  • 🚦 IDS/IPS Probing: Uses low-level TCP signals and HTTP response anomalies to detect deep packet inspection and network-level interception.
  • 🚫 Fail2Ban Discovery: Safely identifies SSH tarpits, "honey-pots," and active ban policies through non-destructive authentication probing.
  • 📊 Risk Scoring: Intelligent scoring system that evaluates detected security layers and provides a "Safe to Scan" recommendation.
  • 🎨 Modern Interface: Built with rich for professional, structured terminal output and high-visibility results.
  • 🤖 Automation Ready: Native JSON output mode for seamless integration into larger security pipelines.

Installation

The Modern Way (Recommended)

Use uv for the fastest experience:

# Run instantly without installing
uvx is-it-safe example.com

# Or install it
uv pip install is-it-safe

The Traditional Way

pip install is-it-safe

From Source

git clone https://github.com/your-username/is-it-safe.git
cd is-it-safe
pip install .

🛠 Usage

# Basic scan
is-it-safe example.com

# Verbose scan with stealth enabled
is-it-safe example.com --stealth --verbose

# Scan specific SSH port for Fail2Ban
sudo is-it-safe example.com --ssh-port 2222

# Output results as JSON
is-it-safe example.com --json > results.json

[!IMPORTANT] Some IDS/IPS detection features require root privileges for raw socket access.

📜 License

This project is licensed under the MIT License - see the LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

is_it_safe-7.0.0.tar.gz (15.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

is_it_safe-7.0.0-py3-none-any.whl (17.0 kB view details)

Uploaded Python 3

File details

Details for the file is_it_safe-7.0.0.tar.gz.

File metadata

  • Download URL: is_it_safe-7.0.0.tar.gz
  • Upload date:
  • Size: 15.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.5.9

File hashes

Hashes for is_it_safe-7.0.0.tar.gz
Algorithm Hash digest
SHA256 5d2956990a44c7fb76739dc3ce1d71eca89e4646e7e70f311baa84c0fdac4db8
MD5 b50762d603611ed7a05faba42c67f7c0
BLAKE2b-256 35c848c508ab3a5e03b3d92ef7c86481232552ec07b13c23bf9ebe83548ee258

See more details on using hashes here.

File details

Details for the file is_it_safe-7.0.0-py3-none-any.whl.

File metadata

  • Download URL: is_it_safe-7.0.0-py3-none-any.whl
  • Upload date:
  • Size: 17.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.5.9

File hashes

Hashes for is_it_safe-7.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 028901ac8453775ebb3cd5b419cfa36902f55c4da2833fb4ebe3c8d8af7e6eb4
MD5 c4e04f33ed4e1aeaaceae95b04f0eb76
BLAKE2b-256 6eac046ba1ffd0eb44b22eb4eb93ac0204864ee5841afdb82588394f63d21ff3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page