starker-scanner 5.0.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2026 STARKER Consulting
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
@@ -0,0 +1,209 @@
1
+ Metadata-Version: 2.4
2
+ Name: starker-scanner
3
+ Version: 5.0.0
4
+ Summary: Enterprise defensive security scanner. Audits SSL, DNS, headers, ports, subdomains and more.
5
+ Home-page: https://github.com/YOUR_USERNAME/starker-scanner
6
+ Author: STARKER Consulting
7
+ Author-email: contact@starkerconsulting.com
8
+ Project-URL: Bug Reports, https://github.com/YOUR_USERNAME/starker-scanner/issues
9
+ Project-URL: Source, https://github.com/YOUR_USERNAME/starker-scanner
10
+ Project-URL: Documentation, https://github.com/YOUR_USERNAME/starker-scanner#readme
11
+ Keywords: security,scanner,audit,ssl,dns,headers,ports,subdomains,waf,tls,infosec,cybersecurity
12
+ Classifier: Development Status :: 5 - Production/Stable
13
+ Classifier: Intended Audience :: Developers
14
+ Classifier: Intended Audience :: System Administrators
15
+ Classifier: Intended Audience :: Information Technology
16
+ Classifier: Topic :: Security
17
+ Classifier: Topic :: Internet :: WWW/HTTP
18
+ Classifier: License :: OSI Approved :: MIT License
19
+ Classifier: Programming Language :: Python :: 3
20
+ Classifier: Programming Language :: Python :: 3.9
21
+ Classifier: Programming Language :: Python :: 3.10
22
+ Classifier: Programming Language :: Python :: 3.11
23
+ Classifier: Programming Language :: Python :: 3.12
24
+ Classifier: Operating System :: OS Independent
25
+ Requires-Python: >=3.9
26
+ Description-Content-Type: text/markdown
27
+ License-File: LICENSE
28
+ Requires-Dist: requests>=2.31.0
29
+ Requires-Dist: python-whois>=0.8.0
30
+ Requires-Dist: dnspython>=2.4.0
31
+ Dynamic: author
32
+ Dynamic: author-email
33
+ Dynamic: classifier
34
+ Dynamic: description
35
+ Dynamic: description-content-type
36
+ Dynamic: home-page
37
+ Dynamic: keywords
38
+ Dynamic: license-file
39
+ Dynamic: project-url
40
+ Dynamic: requires-dist
41
+ Dynamic: requires-python
42
+ Dynamic: summary
43
+
44
+ # STARKER Security Scanner
45
+
46
+ ![Version](https://img.shields.io/badge/version-5.0-blue)
47
+ ![License](https://img.shields.io/badge/license-MIT-green)
48
+ ![Python](https://img.shields.io/badge/python-3.9%2B-yellow)
49
+
50
+ Enterprise-grade **defensive security auditor**. Open source. Zero cost.
51
+
52
+ Designed to expose infrastructure vulnerabilities before attackers do.
53
+
54
+ ---
55
+
56
+ ## What it does
57
+
58
+ Runs 10 independent audit modules against any domain and returns a scored report:
59
+
60
+ | Module | What it checks |
61
+ |---|---|
62
+ | **SSL/TLS** | Certificate validity, expiry, cipher suite, protocol version |
63
+ | **HTTP Headers** | Presence of 11 mandatory security headers |
64
+ | **Cookies** | Secure, HttpOnly, SameSite flags |
65
+ | **DNS** | SPF, DMARC, DNSSEC, NS/MX records |
66
+ | **WHOIS** | Registrar, expiry date, organization |
67
+ | **Port Scan** | 33 common ports, 23 flagged as high-risk |
68
+ | **Subdomains** | 25 common subdomain patterns |
69
+ | **WAF Detection** | Cloudflare, Akamai, AWS WAF, Sucuri, F5, and more |
70
+ | **JS Libraries** | Fingerprints 12 common frameworks |
71
+ | **Redirect Chain** | HTTP → HTTPS enforcement |
72
+
73
+ **Scoring:** Sites start at 100. Each finding deducts weighted points.
74
+
75
+ | Score | Risk Level |
76
+ |---|---|
77
+ | 80–100 | LOW |
78
+ | 60–79 | MODERATE |
79
+ | 40–59 | HIGH |
80
+ | 0–39 | CRITICAL |
81
+
82
+ ---
83
+
84
+ ## Installation
85
+
86
+ ### Via pip
87
+
88
+ ```bash
89
+ pip install starker-scanner
90
+ starker-scan example.com
91
+ ```
92
+
93
+ ### Via Docker
94
+
95
+ ```bash
96
+ docker run --rm starkerconsulting/scanner:5.0 example.com --format html > report.html
97
+ ```
98
+
99
+ ### From source
100
+
101
+ ```bash
102
+ git clone https://github.com/YOUR_USERNAME/starker-scanner.git
103
+ cd starker-scanner
104
+ pip install -r requirements.txt
105
+ python scanner.py example.com
106
+ ```
107
+
108
+ ---
109
+
110
+ ## Usage
111
+
112
+ ```bash
113
+ # Basic scan (JSON output)
114
+ python scanner.py example.com
115
+
116
+ # HTML report
117
+ python scanner.py example.com --format html
118
+
119
+ # CSV export
120
+ python scanner.py example.com --format csv
121
+
122
+ # Custom output path
123
+ python scanner.py example.com --format html --output /reports/example
124
+
125
+ # Skip slow modules
126
+ python scanner.py example.com --skip-whois --skip-subdomains
127
+
128
+ # Verbose (shows all headers)
129
+ python scanner.py example.com --verbose
130
+
131
+ # Adjust performance
132
+ python scanner.py example.com --timeout 20 --workers 100
133
+ ```
134
+
135
+ ### All flags
136
+
137
+ | Flag | Default | Description |
138
+ |---|---|---|
139
+ | `--format` | `json` | Output format: `json`, `html`, `csv` |
140
+ | `--output` | auto | Output file path (no extension needed) |
141
+ | `--timeout` | `12` | Request timeout in seconds |
142
+ | `--workers` | `60` | Parallel threads for port scanning |
143
+ | `--skip-whois` | off | Skip WHOIS lookup |
144
+ | `--skip-ports` | off | Skip port scanning |
145
+ | `--skip-subdomains` | off | Skip subdomain enumeration |
146
+ | `--verbose` | off | Show all response headers |
147
+
148
+ ---
149
+
150
+ ## Output examples
151
+
152
+ ### Terminal summary
153
+
154
+ ```
155
+ ============================================================
156
+ [+] Executive Summary
157
+ ============================================================
158
+ Target : example.com
159
+ Score : 74/100
160
+ Risk : MODERATE
161
+ Penalties : 6
162
+ Open ports : 3
163
+ Subdomains found : 4
164
+ WAF/CDN : Cloudflare
165
+ Scan duration : 14.32s
166
+ ```
167
+
168
+ ### HTML report
169
+
170
+ Full visual report with color-coded findings, organized tables for SSL, DNS, WHOIS, open ports, subdomains, and all HTTP headers.
171
+
172
+ ### JSON report
173
+
174
+ Structured output for integration with SIEM, dashboards, or custom pipelines.
175
+
176
+ ---
177
+
178
+ ## Requirements
179
+
180
+ - Python 3.9+
181
+ - `requests`
182
+ - `python-whois`
183
+ - `dnspython` (optional — enhances DNS analysis)
184
+
185
+ ---
186
+
187
+ ## Legal
188
+
189
+ This tool is intended for **defensive security auditing only**.
190
+
191
+ Run it exclusively on:
192
+ - Domains you own
193
+ - Domains you have written authorization to test
194
+
195
+ Unauthorized scanning may violate local laws including the CFAA (US), Computer Misuse Act (UK), and equivalent legislation in your jurisdiction.
196
+
197
+ The authors accept no liability for misuse.
198
+
199
+ ---
200
+
201
+ ## License
202
+
203
+ MIT License — free for personal and commercial use.
204
+
205
+ ---
206
+
207
+ ## Built by
208
+
209
+ **STARKER Consulting** — Business intelligence and infrastructure security for physical and digital enterprises.
@@ -0,0 +1,166 @@
1
+ # STARKER Security Scanner
2
+
3
+ ![Version](https://img.shields.io/badge/version-5.0-blue)
4
+ ![License](https://img.shields.io/badge/license-MIT-green)
5
+ ![Python](https://img.shields.io/badge/python-3.9%2B-yellow)
6
+
7
+ Enterprise-grade **defensive security auditor**. Open source. Zero cost.
8
+
9
+ Designed to expose infrastructure vulnerabilities before attackers do.
10
+
11
+ ---
12
+
13
+ ## What it does
14
+
15
+ Runs 10 independent audit modules against any domain and returns a scored report:
16
+
17
+ | Module | What it checks |
18
+ |---|---|
19
+ | **SSL/TLS** | Certificate validity, expiry, cipher suite, protocol version |
20
+ | **HTTP Headers** | Presence of 11 mandatory security headers |
21
+ | **Cookies** | Secure, HttpOnly, SameSite flags |
22
+ | **DNS** | SPF, DMARC, DNSSEC, NS/MX records |
23
+ | **WHOIS** | Registrar, expiry date, organization |
24
+ | **Port Scan** | 33 common ports, 23 flagged as high-risk |
25
+ | **Subdomains** | 25 common subdomain patterns |
26
+ | **WAF Detection** | Cloudflare, Akamai, AWS WAF, Sucuri, F5, and more |
27
+ | **JS Libraries** | Fingerprints 12 common frameworks |
28
+ | **Redirect Chain** | HTTP → HTTPS enforcement |
29
+
30
+ **Scoring:** Sites start at 100. Each finding deducts weighted points.
31
+
32
+ | Score | Risk Level |
33
+ |---|---|
34
+ | 80–100 | LOW |
35
+ | 60–79 | MODERATE |
36
+ | 40–59 | HIGH |
37
+ | 0–39 | CRITICAL |
38
+
39
+ ---
40
+
41
+ ## Installation
42
+
43
+ ### Via pip
44
+
45
+ ```bash
46
+ pip install starker-scanner
47
+ starker-scan example.com
48
+ ```
49
+
50
+ ### Via Docker
51
+
52
+ ```bash
53
+ docker run --rm starkerconsulting/scanner:5.0 example.com --format html > report.html
54
+ ```
55
+
56
+ ### From source
57
+
58
+ ```bash
59
+ git clone https://github.com/YOUR_USERNAME/starker-scanner.git
60
+ cd starker-scanner
61
+ pip install -r requirements.txt
62
+ python scanner.py example.com
63
+ ```
64
+
65
+ ---
66
+
67
+ ## Usage
68
+
69
+ ```bash
70
+ # Basic scan (JSON output)
71
+ python scanner.py example.com
72
+
73
+ # HTML report
74
+ python scanner.py example.com --format html
75
+
76
+ # CSV export
77
+ python scanner.py example.com --format csv
78
+
79
+ # Custom output path
80
+ python scanner.py example.com --format html --output /reports/example
81
+
82
+ # Skip slow modules
83
+ python scanner.py example.com --skip-whois --skip-subdomains
84
+
85
+ # Verbose (shows all headers)
86
+ python scanner.py example.com --verbose
87
+
88
+ # Adjust performance
89
+ python scanner.py example.com --timeout 20 --workers 100
90
+ ```
91
+
92
+ ### All flags
93
+
94
+ | Flag | Default | Description |
95
+ |---|---|---|
96
+ | `--format` | `json` | Output format: `json`, `html`, `csv` |
97
+ | `--output` | auto | Output file path (no extension needed) |
98
+ | `--timeout` | `12` | Request timeout in seconds |
99
+ | `--workers` | `60` | Parallel threads for port scanning |
100
+ | `--skip-whois` | off | Skip WHOIS lookup |
101
+ | `--skip-ports` | off | Skip port scanning |
102
+ | `--skip-subdomains` | off | Skip subdomain enumeration |
103
+ | `--verbose` | off | Show all response headers |
104
+
105
+ ---
106
+
107
+ ## Output examples
108
+
109
+ ### Terminal summary
110
+
111
+ ```
112
+ ============================================================
113
+ [+] Executive Summary
114
+ ============================================================
115
+ Target : example.com
116
+ Score : 74/100
117
+ Risk : MODERATE
118
+ Penalties : 6
119
+ Open ports : 3
120
+ Subdomains found : 4
121
+ WAF/CDN : Cloudflare
122
+ Scan duration : 14.32s
123
+ ```
124
+
125
+ ### HTML report
126
+
127
+ Full visual report with color-coded findings, organized tables for SSL, DNS, WHOIS, open ports, subdomains, and all HTTP headers.
128
+
129
+ ### JSON report
130
+
131
+ Structured output for integration with SIEM, dashboards, or custom pipelines.
132
+
133
+ ---
134
+
135
+ ## Requirements
136
+
137
+ - Python 3.9+
138
+ - `requests`
139
+ - `python-whois`
140
+ - `dnspython` (optional — enhances DNS analysis)
141
+
142
+ ---
143
+
144
+ ## Legal
145
+
146
+ This tool is intended for **defensive security auditing only**.
147
+
148
+ Run it exclusively on:
149
+ - Domains you own
150
+ - Domains you have written authorization to test
151
+
152
+ Unauthorized scanning may violate local laws including the CFAA (US), Computer Misuse Act (UK), and equivalent legislation in your jurisdiction.
153
+
154
+ The authors accept no liability for misuse.
155
+
156
+ ---
157
+
158
+ ## License
159
+
160
+ MIT License — free for personal and commercial use.
161
+
162
+ ---
163
+
164
+ ## Built by
165
+
166
+ **STARKER Consulting** — Business intelligence and infrastructure security for physical and digital enterprises.