Share
## https://sploitus.com/exploit?id=CFEBF7AF-651A-5302-80B8-F8146D5B33A6
# SentinelSSH: Advanced CVE-2024-6387 Vulnerability Scanner

SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.

## Installation

To install SentinelSSH, make sure you have Go installed on your system (version 1.16 or later), then run:

```bash
go install github.com/harshinsecurity/sentinelssh/cmd/sentinelssh@latest
```
## Usage

After installation, you can run SentinelSSH directly from the command line:

```bash
sentinelssh [flags] [targets...]
```

### Flags

- `--port, -p`: Target port number (default: 22)
- `--timeout, -t`: Connection timeout in seconds (default: 5)
- `--concurrency, -c`: Number of concurrent scans (default: 100)
- `--output, -o`: Output file for detailed results (CSV format)
- `--file, -f`: File containing list of targets

### Examples

Scan a single IP:
```bash
sentinelssh 192.168.1.1
```

Scan a domain:
```bash
sentinelssh example.com
```

Scan multiple targets:
```bash
sentinelssh example.com 192.168.1.1 10.0.0.1
```

Scan targets from a file:
```bash
sentinelssh -f targets.txt
```

Save results to a CSV file:
```bash
sentinelssh -o results.csv 192.168.1.1 example.com
```

Custom port and higher concurrency:
```bash
sentinelssh --port 2222 --concurrency 200 192.168.1.0/24
```

## Features

- Targeted CVE-2024-6387 detection
- Support for IP addresses, domain names, and CIDR ranges
- High-speed concurrent scanning
- Comprehensive version analysis
- Detailed, color-coded console output
- CSV export for further analysis
- Customizable scan parameters

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## Contributing

Contributions are welcome! Please feel free to submit a Pull Request.