11/12 free views
Tool
CLI
Incident Response & Management

GScan

by grayddq

2.8Kstars
630forks
51watchers
Updated 5 months ago
About

GScan is an automated Linux host security checklist scanner designed to assist incident responders in comprehensive threat detection and hacker attack path tracing.

本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。

Primary Use Case

This tool is primarily used by security incident response teams to perform thorough and automated security inspections on Linux hosts, especially CentOS systems. It facilitates rapid identification of suspicious activities, backdoors, rootkits, and configuration weaknesses, enabling efficient forensic analysis and threat hunting during incident investigations.

Key Features
  • Automated comprehensive checklist-based security scanning of Linux hosts
  • Detection of suspicious files, hidden files, and system executable anomalies
  • Process and network anomaly detection including overseas IP connections and reverse shells
  • Extensive backdoor detection covering LD_PRELOAD, cron, SSH, setUID, and system startup items
  • Account security checks including root and empty password accounts, sudoers, and SSH keys
  • Log analysis for multiple login records (secure, wtmp, utmp, lastlog)
  • Rootkit and malware signature detection
  • WebShell file scanning

Installation

  • git clone https://github.com/grayddq/GScan.git
  • cd GScan
  • Ensure root privileges to run the tool
  • Use Python 2.x or 3.x installed on CentOS 6 or 7
  • Run the main script with python GScan.py

Usage

>_ python GScan.py

Run the default security scan on the host

>_ python GScan.py --sug --pro

Run scan with manual investigation suggestions and preliminary remediation plans

>_ python GScan.py --job

Set up a scheduled daily scan at midnight

>_ python GScan.py --job --hour=2

Set up a scheduled scan to run every 2 hours

>_ python GScan.py -h

Display help information and available command options

>_ python GScan.py --overseas

Run scan in overseas mode, disabling overseas IP matching

>_ python GScan.py --full

Enable full comprehensive scan mode

>_ python GScan.py --debug

Run in debug mode to output detailed debugging information

>_ python GScan.py --dif

Compare current scan results with previous results and output differences

>_ python GScan.py --time='YYYY-MM-DD HH:MM:SS~YYYY-MM-DD HH:MM:SS'

Search for all files modified within the specified time range

Security Frameworks
Discovery
Collection
Credential Access
Defense Evasion
Impact
Usage Insights
  • Integrate GScan with SIEM solutions to automate alerting on suspicious findings.
  • Schedule regular GScan runs as part of incident response playbooks to speed up triage.
  • Enhance the tool with custom YARA rules for organization-specific threat hunting.
  • Use GScan output to build threat intelligence on attacker TTPs for purple team exercises.
  • Deploy GScan in containerized environments for rapid scanning of ephemeral Linux hosts.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about GScan. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team60%
Blue Team90%
Purple Team75%
Details
LanguagePython
Open Issues15
Topics
security
security-scanning
security-tools
vulnerability-scanning
auditing
security-audit