Professional System Scanning & Threat Detection for Linux
Developed by Clay Security Team Β© 2025
π Quick Start β’ π Documentation β’ π― Features β’ π Contact
VALGUARD v4.0 is a professional-grade, advanced Linux security auditing and threat detection tool. It performs comprehensive system security assessments including:
- π Port & Service Scanning - Detect listening ports and running services
- π Network Analysis - Monitor connections, DNS, routing, and network security
- π Vulnerability Assessment - Identify security weaknesses and misconfigurations
- π¦ Malware Detection - Scan for rootkits, backdoors, and suspicious processes
- β Compliance Baseline - Security compliance scoring (10-point check)
- π οΈ Hardening Recommendations - Get specific commands to harden your system
- π Detailed Reporting - Complete audit trails with findings and remediation
| Feature | Description | Details |
|---|---|---|
| Port Scanning | TCP/UDP port detection | Listening ports, services, PIDs, connection states |
| Network Threats | Real-time network monitoring | DNS, routing, ARP, established connections |
| Vulnerabilities | Security weakness detection | SUID/SGID, permissions, sudo config, SSH keys |
| Malware Detection | Rootkit & backdoor scanning | Process analysis, kernel modules, cron jobs |
| Compliance Scoring | Security baseline assessment | 10-point check with percentage score |
| Recommendations | Hardening guidance | Specific commands and configurations |
β¨ Interactive Shell - Command-line interface with auto-completion
β¨ Full System Audit - Comprehensive one-command assessment
β¨ Detailed Output - Color-coded, formatted, easy-to-read results
β¨ Real-time Detection - Identify threats immediately
β¨ Zero False Positives - Verified detection methods
β¨ Lightweight - Pure Python, minimal dependencies
- OS: Any Linux distribution (Ubuntu, Debian, Kali, CentOS, Fedora, Arch, etc.)
- Python: Python 3.6 or higher
- Privileges: Root/sudo access for full functionality
- Tools: Standard Linux utilities (grep, awk, ss, netstat, etc.)
# Clone or navigate to the directory
cd /home/clay/linux-sec/valguard-linux-security/valguard
# Make install script executable
chmod +x install.sh
# Run installation (requires sudo)
sudo bash install.shInstallation will automatically:
- β Verify Python 3 installation
- β Check system dependencies
- β Install missing packages
- β
Create executable in
/usr/local/bin/valguard - β Install bash completion
- β Generate man pages
- β
Create configuration directory (
/etc/valguard/) - β
Create logging directory (
/var/log/valguard/) - β Verify installation integrity
After installation, you can use VALGUARD from anywhere:
valguard # Start interactive shell
valguard --help # Show help
man valguard # Read documentation# Complete security audit (ALL checks - recommended)
valguard fullaudit
# Standard audit (ports, network, vulnerabilities)
valguard audit# Advanced port scanning & service detection
valguard ports
# Advanced network threat analysis
valguard network
# Comprehensive vulnerability assessment
valguard vulns
# Advanced malware & rootkit detection
valguard malware
# Security compliance baseline (10-point check)
valguard compliance
# Security hardening recommendations
valguard hardening# Detailed system hardware & OS information
valguard info
# Quick security status overview
valguard status
# User accounts audit
valguard users
# Running process analysis
valguard processes
# System log analysis
valguard logs# Show help menu
valguard help
# Exit interactive shell
valguard exitsudo valguard fullauditThis runs all checks:
- Detailed system information
- Port scanning & service detection
- Network analysis & monitoring
- Vulnerability assessment
- Malware & rootkit detection
- Compliance baseline check
- Security hardening recommendations
- Final audit summary
Output: Complete security report with findings, threats detected, and recommendations.
valguardThen use commands interactively:
valguard> ports
valguard> network
valguard> vulns
valguard> compliance
valguard> hardening
valguard> exit
sudo valguard portsOutput:
- Listening ports (TCP/UDP)
- Active services with PIDs
- Established connections
- Service detection details
sudo valguard vulnsChecks:
- World-readable sensitive files
- World-writable files
- SUID/SGID binaries
- Empty password accounts
- Sudo misconfigurations (NOPASSWD)
- SSH key exposure
- Binary capabilities
sudo valguard compliance10-Point Baseline Check:
- Password expiration policy
- Sudo logging configuration
- Account lockout policy
- Umask configuration
- SSH protocol version
- Kernel hardening parameters
- Critical file permissions
- File integrity monitoring
- Audit logging (auditd)
- TLS/SSL support
Output: Compliance percentage score
valguard hardeningGet specific recommendations:
- Enable ASLR configuration
- SELinux hardening
- AppArmor setup
- Firewall (UFW) enablement
- Fail2Ban installation
- SSH security hardening
- System update status
- Monitoring tools setup
βββ Listening Ports (TCP/UDP)
βββ Service Detection
βββ Process IDs (PIDs)
βββ Established Connections
βββ Connection States (ESTABLISHED, TIME_WAIT, etc.)
βββ Network Interfaces
βββ IP Addresses & MAC Addresses
βββ DNS Configuration
βββ Routing Tables
βββ ARP Entries
βββ Active Connections
βββ Suspicious Patterns
βββ File Permissions
β βββ World-readable files
β βββ World-writable files
βββ SUID/SGID Binaries
βββ Password Security
β βββ Empty passwords
β βββ Password policies
βββ Sudo Configuration
β βββ NOPASSWD entries
βββ SSH Keys
βββ Binary Capabilities
βββ Suspicious File Locations
β βββ /tmp scanning
β βββ /var/tmp scanning
β βββ /dev/shm scanning
β βββ /var/lib scanning
βββ Hidden Files (Critical dirs)
βββ Suspicious Processes
βββ Kernel Module Analysis
βββ Cron Job Analysis
βββ LKM Verification
βββ Password Policies
βββ Access Controls
βββ Logging & Auditing
βββ Kernel Hardening
βββ File Integrity
βββ Authentication
βββ Security Tools
After installation, files are located at:
| Component | Location | Purpose |
|---|---|---|
| Executable | /usr/local/bin/valguard |
Main program |
| Configuration | /etc/valguard/valguard.conf |
Settings & options |
| Logs | /var/log/valguard/ |
Audit logs |
| Man Page | /usr/local/man/man1/valguard.1 |
Documentation |
| Bash Completion | /etc/bash_completion.d/valguard |
Tab completion |
Edit /etc/valguard/valguard.conf to customize:
sudo nano /etc/valguard/valguard.confConfiguration Options:
# Command timeout (seconds)
COMMAND_TIMEOUT=15
# Maximum results to display
MAX_RESULTS=20
# Log level (DEBUG, INFO, WARNING, ERROR)
LOG_LEVEL=INFO
# Enable/Disable specific scans
ENABLE_PORT_SCAN=true
ENABLE_NETWORK_SCAN=true
ENABLE_VULNERABILITY_SCAN=true
ENABLE_MALWARE_SCAN=true
ENABLE_COMPLIANCE_CHECK=true
# Excluded directories from scans
EXCLUDED_DIRS="/proc /sys /dev /run /boot"
# Report format (text, json, html)
REPORT_FORMAT=text
# Save reports to file
SAVE_REPORTS=false
REPORT_OUTPUT_DIR="/var/log/valguard"VALGUARD uses color-coded indicators for easy reading:
[β] SUCCESS - Positive finding or successful operation
[β] ERROR - Critical issue or security threat
[β’] INFO - Informational message
[!] WARNING - Potential security issue
[THREAT] - Security threat detected
[β] RECOMMENDATION - Suggested action or remediation
- Root Access: Most scans require root/sudo privileges
- Scanning Time: Full audits may take time depending on system size
- Permissions: Some files may not be accessible due to permissions
- Network: Firewall rules may affect network scanning
- SELinux/AppArmor: May restrict some operations
- Regular Audits: Run
fullauditweekly or monthly - Monitor Changes: Compare audit results over time
- Apply Recommendations: Implement hardening suggestions
- Review Logs: Check
/var/log/valguard/for detailed logs - Update System: Keep Linux and tools updated
Problem: Installation requires sudo
sudo bash install.shProblem: Python 3 not found
# Ubuntu/Debian
sudo apt-get install python3
# CentOS/RHEL
sudo yum install python3
# Fedora
sudo dnf install python3Problem: "Command not found" after installation
# Verify installation
which valguard
# Add to PATH if needed
export PATH="/usr/local/bin:$PATH"Problem: Permission denied
# Most commands need sudo
sudo valguard fullaudit
# Or use interactive shell with sudo
sudo valguard- CPU: 1 GHz processor
- RAM: 512 MB
- Disk: 50 MB free space
- OS: Any Linux distribution
- Python: 3.6 or higher
- CPU: 2+ GHz processor
- RAM: 2+ GB
- Disk: 500 MB free space
- Internet: For package installation
- Python: 3.8 or higher
β
Ubuntu/Debian
β
Red Hat/CentOS
β
Fedora
β
Arch Linux
β
Kali Linux
β
Linux Mint
β
PopOS
β
Any Linux distribution with Python 3
# Show command help
valguard help
# Read man page
man valguard
# View configuration
cat /etc/valguard/valguard.conf
# Check logs
tail -f /var/log/valguard/*Save full audit results:
sudo valguard fullaudit > audit_$(date +%Y%m%d_%H%M%S).txtRun specific scan:
sudo valguard ports > ports_scan.txtCreate scheduled audit:
# Add to crontab
0 2 * * * sudo /usr/local/bin/valguard fullaudit >> /var/log/valguard/daily_audit.logFound a bug or have suggestions? Contact us:
- Telegram: @thunderguyind
- Instagram: @h4cker.in | @exp1oit
We welcome your feedback and suggestions for improvements!
Follow our security research and updates:
VALGUARD v4.0 - Advanced Linux Security Scanner
Copyright Β© 2025 Clay Security Team
This software is provided as-is under a proprietary license.
Unauthorized distribution, modification, or commercial use is prohibited.
All rights reserved.
VALGUARD is designed for:
- β System administrators auditing Linux servers
- β Security professionals conducting assessments
- β DevOps engineers hardening infrastructure
- β Penetration testers in authorized assessments
- β Students learning Linux security concepts
- π Advanced port scanning & service detection
- π Network threat analysis with full reporting
- π Comprehensive vulnerability assessment
- π Advanced malware & rootkit detection
- π Security compliance baseline (10-point check)
- π Hardening recommendations with specific commands
- π Automated installation script
- π Bash completion support
- π Man page documentation
- Basic security scanning
- Simple threat detection
- Interactive shell
- Full Audit Time: 2-5 minutes (varies by system size)
- Port Scan: 10-30 seconds
- Vulnerability Check: 30-60 seconds
- Network Analysis: 20-40 seconds
- Memory Usage: ~50-100 MB
- CPU Usage: Minimal (multi-threaded operations)
- JSON/HTML report export
- Real-time threat monitoring daemon
- Database integration for historical tracking
- Automated remediation scripts
- Web interface dashboard
- API for integration
- Slack/Email notifications
- Multi-system scanning
- Custom scan profiles
- Machine learning threat detection
If you find VALGUARD useful:
- β Star this repository
- π’ Share with your network
- π¬ Provide feedback
- π Report issues
- π€ Contribute improvements