SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.
To install SentinelSSH, make sure you have Go installed on your system (version 1.16 or later), then run:
go install github.com/harshinsecurity/sentinelssh/cmd/sentinelssh@latestAfter installation, you can run SentinelSSH directly from the command line:
sentinelssh [flags] [targets...]--port, -p: Target port number (default: 22)--timeout, -t: Connection timeout in seconds (default: 5)--concurrency, -c: Number of concurrent scans (default: 100)--output, -o: Output file for detailed results (CSV format)--file, -f: File containing list of targets
Scan a single IP:
sentinelssh 192.168.1.1Scan a domain:
sentinelssh example.comScan multiple targets:
sentinelssh example.com 192.168.1.1 10.0.0.1Scan targets from a file:
sentinelssh -f targets.txtSave results to a CSV file:
sentinelssh -o results.csv 192.168.1.1 example.comCustom port and higher concurrency:
sentinelssh --port 2222 --concurrency 200 192.168.1.0/24- Targeted CVE-2024-6387 detection
- Support for IP addresses, domain names, and CIDR ranges
- High-speed concurrent scanning
- Comprehensive version analysis
- Detailed, color-coded console output
- CSV export for further analysis
- Customizable scan parameters
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please feel free to submit a Pull Request.