BitSentry — Product Showcase
BitProbe: Web Application Security Scanner
BitProbe is a modular, professional-grade web application security scanner built for penetration testers, security engineers, and full-stack developers. It performs deep passive and active analysis of web applications to identify vulnerabilities, misconfigurations, and exposed attack surfaces. It is one tool built within a suite of software currently under development named Bitsentry. BitProbe is one of the products on the platform.
Core Capabilities
Passive Fingerprinting
Automatically identifies:
- Web frameworks and languages
- Web servers and CDNs
- Analytics and tracking tools
- WAF indicators
- Version and technology hints
Security Header Analysis
Evaluates the presence and strength of essential headers:
- Strict-Transport-Security
- X-Frame-Options
- X-Content-Type-Options
- Content-Security-Policy
Provides detailed remediation recommendations.
Sensitive File Exposure Detection
Scans for high-risk files commonly targeted by attackers, including:
- .env
- .git directories
- SQL dumps and backup archives
- Configuration files
- Server misconfigurations
CVE Correlation Engine
Maps detected technologies to known CVEs using a local vulnerability database.
Each correlation includes:
- Severity
- Description
- Attack scenario
- Defense strategy
- Mitigation plan
Network Surface Detection
Performs targeted port probing on the web server to detect:
- Open services
- Exposed ports
- Attack surface expansion vectors
TLS Configuration Analysis
Inspects:
- Supported TLS versions
- Cipher strength
- Certificate validity
- Chain configuration
- Exposure to downgrade or MITM attacks
Automated Reporting Suite
Generates multiple report formats:
- JSON (structured raw data)
- Markdown (developer-friendly summary)
- PDF (professional client report)
Reports include:
- Sorted vulnerabilities
- Risk scoring
- Attack chain mapping
- Mitigation guidance
Risk Scoring and Attack Chains
BitProbe evaluates:
- Severity
- Impact
- Exploitability
- Exposure
Attack chain modeling shows how individual findings combine into realistic offensive paths, such as:
Weak TLS → MITM Exposure → Credential Theft → Session Hijacking
Modular Plugin Architecture
All scan capabilities are implemented as independent plugins for maximum flexibility and extensibility.