Metadata-Version: 2.4
Name: is-it-safe
Version: 6.0.0
Summary: Stealthy Security Layer Detector (WAF/IDS/IPS/Fail2Ban)
Author-email: Mithun <mitchastertheblaster@gmail.com>
Project-URL: Homepage, https://github.com/MKMithun2806/is-it-safe
Project-URL: Bug Tracker, https://github.com/MKMithun2806/is-it-safe/issues
Classifier: Programming Language :: Python :: 3
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Topic :: Security
Requires-Python: >=3.8
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: requests>=2.31.0
Requires-Dist: urllib3>=2.0.0
Requires-Dist: rich>=13.7.0
Requires-Dist: ipaddress>=1.0.23
Requires-Dist: scapy>=2.5.0
Requires-Dist: paramiko>=3.4.0
Provides-Extra: test
Requires-Dist: pytest>=7.4.0; extra == "test"
Requires-Dist: pytest-mock>=3.12.0; extra == "test"
Dynamic: license-file

# is-it-safe 🛡️

[![PyPI version](https://img.shields.io/pypi/v/is-it-safe.svg)](https://pypi.org/project/is-it-safe/)
[![Python versions](https://img.shields.io/pypi/pyversions/is-it-safe.svg)](https://pypi.org/project/is-it-safe/)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)

**Stealthy Security Layer Fingerprinting & Detection v5.0**

`is-it-safe` is a modern, high-performance security utility designed to map and identify protective layers surrounding a target without triggering aggressive defense mechanisms. It provides deep visibility into infrastructure security by fingerprinting WAFs, IDS/IPS, and automated blocking systems.

##  Key Features

*   🛡️ **WAF Fingerprinting:** Identifies 10+ major WAF vendors (Cloudflare, Akamai, AWS, Imperva, etc.) via signature-based and behavioral analysis.
*   🕵️ **Stealth-First Detection:** Implements adaptive jitter, randomized headers, and low-signal request patterns to bypass basic rate-limiters and heuristics.
*   🚦 **IDS/IPS Probing:** Uses low-level TCP signals and HTTP response anomalies to detect deep packet inspection and network-level interception.
*   🚫 **Fail2Ban Discovery:** Safely identifies SSH tarpits, "honey-pots," and active ban policies through non-destructive authentication probing.
*   📊 **Risk Scoring:** Intelligent scoring system that evaluates detected security layers and provides a "Safe to Scan" recommendation.
*   🎨 **Modern Interface:** Built with `rich` for professional, structured terminal output and high-visibility results.
*   🤖 **Automation Ready:** Native JSON output mode for seamless integration into larger security pipelines.

##  Installation

### The Modern Way (Recommended)
Use [uv](https://github.com/astral-sh/uv) for the fastest experience:

```bash
# Run instantly without installing
uvx is-it-safe example.com

# Or install it
uv pip install is-it-safe
```

### The Traditional Way
```bash
pip install is-it-safe
```

### From Source
```bash
git clone https://github.com/your-username/is-it-safe.git
cd is-it-safe
pip install .
```

## 🛠 Usage

```bash
# Basic scan
is-it-safe example.com

# Verbose scan with stealth enabled
is-it-safe example.com --stealth --verbose

# Scan specific SSH port for Fail2Ban
sudo is-it-safe example.com --ssh-port 2222

# Output results as JSON
is-it-safe example.com --json > results.json
```

> [!IMPORTANT]
> Some IDS/IPS detection features require **root privileges** for raw socket access.

## 📜 License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

