This repository contains a tool for automating the process of scanning for vulnerabilities in a list of domains. The tool is designed to streamline the process of identifying potential security weaknesses and provide an easy-to-read report of its findings.
- bash
- Nmap
Clone the repository:
git clone https://github.com/capstone-project-cybersecurity/automate-scan.git
cd $PWD/automate-scan
To run the tool, simply execute the following command in the repository directory:
./automate-scan.sh
The tool will then run a series of scans based of the list.txt and generate a output of the finding.
To run the tool inside a container is going to be more scalable and portable.
- docker
- bash
Clone the repository:
git clone https://github.com/capstone-project-cybersecurity/automate-scan.git
cd $PWD/automate-scan
docker build -t automate-scan . && docker run automate-scan
To run the tool inside a container is going to be more scalable and portable. Also we can integrate with automation tool.
- docker
- docker compose
- Jenkins as a container
Clone the repository:
git clone https://github.com/capstone-project-cybersecurity/automate-scan.git
cd $PWD/automate-scan/ci
docker build -t jenkins-customized-project .
docker tag $(docker images | grep jenkins-customized-project | awk '{print $3}') danielgomeza/jenkins-customized-project
docker login
docker push danielgomeza/jenkins-customized-project:latest
docker-compose up -d
curl http://localhost:8080 # test that you already can reach jenkins web locally
Docker push to container registry
Seaching slack notification pluggin
Installing slack notification pluggin
Configuring slack notification
Jenkins configuration slack token
Jenkins finished configuration slack notification
We welcome contributions to this project. If you would like to contribute, please fork the repository and create a pull request with your changes.
This project is licensed under the MIT License.