OXYNAS Sentinel is a comprehensive security analysis platform that combines code scanning, network reconnaissance, and AI-powered vulnerability assessment into one integrated solution.
- Semgrep Integration: Static analysis of source code using Semgrep rules
- Multiple Language Support: Python, JavaScript, Java, and more
- Custom Rulesets: Choose specialized security rulesets or language-specific ones
- Nmap Scanning: Port discovery and service identification
- Subdomain Discovery: Find hidden subdomains using built-in DNS techniques
- Directory Fuzzing: Identify hidden directories and files on web servers
- Vulnerability Assessment: AI evaluation of detected security issues
- Remediation Suggestions: Get AI-generated fixes for identified vulnerabilities
- Risk Prioritization: Intelligent sorting of findings by severity and impact
- Python 3.10+
- Git
- Nmap (for network scanning)
- Clone the repository:
git clone https://github.com/yourusername/oxynas.git
cd oxynas- Create a virtual environment and activate it:
python -m venv .venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate- Install dependencies:
pip install -r requirements.txt- Run the application:
python oxynas_analyzer_gui.py- Select a ZIP file containing your source code
- Choose an appropriate ruleset for your code
- Start the analysis
- Review findings and AI-generated recommendations
- Enter a target URL or domain
- Select reconnaissance options (subdomain discovery, directory fuzzing)
- Run a comprehensive scan
- Analyze the scan results and identified vulnerabilities
analyzer.py: Core code analysis functionality using Semgrepnmap.py: Network scanning functionalitysubfinder.py: Subdomain discovery moduledirfuzzer.py: Directory fuzzing implementationai_model.py: AI analysis of vulnerabilitiesutils.py: Utility functions for file handlingoxynas_analyzer_gui.py: Graphical user interface
To use Semgrep's advanced features, you can add your Semgrep API token to a .env file:
SEMGREP_APP_TOKEN=your_token_here
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License - see the LICENSE file for details.
- Built with Semgrep for static code analysis
- Utilizes dirsearch for directory fuzzing capabilities
- Leverages Nmap for network reconnaissance