A comprehensive system enumeration and security assessment tool designed for security professionals, penetration testers, and system administrators.
- Clone the repository:
git clone https://github.com/frknaykc/DragonEye.git
cd DragonEye- Make scripts executable:
chmod +x dragoneye.sh dragoneye_macos.sh report_generator.sh./dragoneye.sh # Interactive mode
./dragoneye.sh ctf # CTF mode
./dragoneye.sh pentest # Pentest mode./dragoneye_macos.sh # Full system enumeration# Run PowerShell as Administrator
Set-ExecutionPolicy Bypass -Scope Process -Force
./dragoneye.ps1 # Full system enumeration# Generate HTML report from enumeration output
./report_generator.sh dragoneye_report.txt- Zero Dependencies: Works with native system commands
- Cross-Platform Support:
- Linux (
dragoneye.sh) - macOS (
dragoneye_macos.sh) - Windows (
dragoneye.ps1)
- Linux (
- Multiple Operation Modes:
- Interactive Mode: Guided enumeration
- CTF Mode: Quick checks for CTF challenges
- Pentest Mode: Comprehensive security assessment
-
System Information:
- OS version and build details
- Hardware specifications
- CPU and memory information
- Storage configuration
- Network adapters
-
Security Checks:
- SUID/SGID files
- World-writable directories
- Misconfigured permissions
- Security features status
- System integrity checks
-
User Analysis:
- User permissions
- Group memberships
- Login configurations
- Sudo access
- Authentication logs
-
Network Security:
- Open ports
- Active connections
- Network configurations
- Firewall rules
- DNS settings
- Modern, responsive design
- Interactive navigation
- Search functionality
- Section-based organization
- Color-coded findings:
- π΄ Critical Issues
- π‘ Warnings
- π’ Passed Checks
- Command copying
- Executive summary
- Sensitive Information: Reports may contain sensitive system data
- Elevated Privileges: Some checks require root/administrator access
- System Impact: Certain checks might trigger security controls
- Data Handling: Handle generated reports with appropriate security measures
./dragoneye.sh ctf output.txt./dragoneye.sh pentest --verbose./dragoneye_macos.sh
./report_generator.sh dragoneye_macos_*.txt- Detailed command output
- Timestamped entries
- Exit codes
- Error messages
- Interactive interface
- Responsive design
- Searchable content
- Categorized findings
- Visual indicators
- Command copying
- Section navigation
We welcome contributions! Please see our Contributing Guidelines for details on how to submit pull requests, report bugs, and suggest enhancements.
For security-related matters, please review our Security Policy before reporting any security vulnerabilities.
This project is licensed under the MIT License - see the LICENSE file for details.
This tool is intended for authorized security testing and system administration only. Users are responsible for obtaining appropriate permissions before running security assessments.
