Skip to content

frknaykc/DragonEye

Repository files navigation

DragonEye Logo

DragonEye - Advanced System Enumeration Tool

Stars Forks Issues License
Platform Support Project Type Language

A comprehensive system enumeration and security assessment tool designed for security professionals, penetration testers, and system administrators.

πŸš€ Quick Start

  1. Clone the repository:
git clone https://github.com/frknaykc/DragonEye.git
cd DragonEye
  1. Make scripts executable:
chmod +x dragoneye.sh dragoneye_macos.sh report_generator.sh

πŸ“– Basic Usage

Linux:

./dragoneye.sh                  # Interactive mode
./dragoneye.sh ctf             # CTF mode
./dragoneye.sh pentest         # Pentest mode

macOS:

./dragoneye_macos.sh           # Full system enumeration

Windows:

# Run PowerShell as Administrator
Set-ExecutionPolicy Bypass -Scope Process -Force
./dragoneye.ps1               # Full system enumeration

Report Generation:

# Generate HTML report from enumeration output
./report_generator.sh dragoneye_report.txt

🌟 Features

Core Capabilities

  • Zero Dependencies: Works with native system commands
  • Cross-Platform Support:
    • Linux (dragoneye.sh)
    • macOS (dragoneye_macos.sh)
    • Windows (dragoneye.ps1)
  • Multiple Operation Modes:
    • Interactive Mode: Guided enumeration
    • CTF Mode: Quick checks for CTF challenges
    • Pentest Mode: Comprehensive security assessment

System Analysis

  • System Information:

    • OS version and build details
    • Hardware specifications
    • CPU and memory information
    • Storage configuration
    • Network adapters
  • Security Checks:

    • SUID/SGID files
    • World-writable directories
    • Misconfigured permissions
    • Security features status
    • System integrity checks
  • User Analysis:

    • User permissions
    • Group memberships
    • Login configurations
    • Sudo access
    • Authentication logs
  • Network Security:

    • Open ports
    • Active connections
    • Network configurations
    • Firewall rules
    • DNS settings

πŸ“Š Advanced Reporting

HTML Report Features:

  • Modern, responsive design
  • Interactive navigation
  • Search functionality
  • Section-based organization
  • Color-coded findings:
    • πŸ”΄ Critical Issues
    • 🟑 Warnings
    • 🟒 Passed Checks
  • Command copying
  • Executive summary

πŸ›‘οΈ Security Considerations

  • Sensitive Information: Reports may contain sensitive system data
  • Elevated Privileges: Some checks require root/administrator access
  • System Impact: Certain checks might trigger security controls
  • Data Handling: Handle generated reports with appropriate security measures

πŸ”§ Advanced Usage Examples

1. CTF Mode with Custom Output:

./dragoneye.sh ctf output.txt

2. Pentest Mode with Verbose Output:

./dragoneye.sh pentest --verbose

3. macOS Security Audit:

./dragoneye_macos.sh
./report_generator.sh dragoneye_macos_*.txt

πŸ“ Output Formats

1. Raw Text:

  • Detailed command output
  • Timestamped entries
  • Exit codes
  • Error messages

2. HTML Report:

  • Interactive interface
  • Responsive design
  • Searchable content
  • Categorized findings
  • Visual indicators
  • Command copying
  • Section navigation

🀝 Contributing

We welcome contributions! Please see our Contributing Guidelines for details on how to submit pull requests, report bugs, and suggest enhancements.

πŸ”’ Security

For security-related matters, please review our Security Policy before reporting any security vulnerabilities.

πŸ“œ License

This project is licensed under the MIT License - see the LICENSE file for details.

⚠️ Disclaimer

This tool is intended for authorized security testing and system administration only. Users are responsible for obtaining appropriate permissions before running security assessments.