ServerSleuth is a command-line tool designed to check web server information disclosure by analyzing server headers. It provides insights into potential vulnerabilities and helps fortify web environments against information disclosure risks.
- Server header analysis for information disclosure assessment.
- User-friendly interface for quick and easy usage.
- Versatile reporting with results displayed in both console and Excel format.
Follow these steps to install ServerSleuth:
- Clone the Repository:
git clone https://github.com/yourusername/serversleuth.git
- Navigate to ServerSleuth Directory:
cd serversleuth
- Install Dependencies:
pip install -r requirements.txt
ServerSleuth is simple to use. Here are examples of how to run it:
- Single URL:
python serversleuth.py -t https://example.com
- Multiple URLs from a File:
python serversleuth.py -f urls.txt
ServerSleuth produces clear and concise results in a tabular format. The information is displayed in the console and saved in an Excel file for further analysis or sharing.
ServerSleuth focuses on server header analysis and may not cover all potential security issues. Users are encouraged to complement its usage with other security tools for comprehensive assessments.
Operate ServerSleuth with responsible and ethical usage. Adhere to security best practices, obtain proper authorization, and use the tool only on systems you are authorized to assess.
We welcome contributions and feedback to improve ServerSleuth. Feel free to report issues, share experiences, or contribute to its development.
ServerSleuth is released under the MIT License.
- 👋 Hi, I’m Ravindra Dagale | Information Security | Security Researcher
- 📫 How to reach me Instagram | YouTube
With ServerSleuth at your disposal, you're well-equipped to bolster your web security defenses. Start your journey towards a more resilient web environment today!