Skip to content

mrceha/NexusEye

NEXUSEYE

The Self-Hosted Internet Intelligence Engine

NexusEye Interface

License Python FastAPI React

Unprecedented visibility into internet-connected devices. Discover services, aggregate banners, and match vulnerabilities at scale—all from your own infrastructure.


⚡ What is NexusEye?

NexusEye is an open-source, high-performance reconnaissance platform designed to be your private alternative to tools like Shodan, Censys, or ZoomEye.

Built for penetration testers, security researchers, and network administrators, it combines an asynchronous network scanning engine with an Elasticsearch-powered analytical backend and a cinematic, cyber-luxury frontend interface.

The Problem It Solves

Public search engines rate-limit your queries, obscure data behind enterprise paywalls, and force you to share your reconnaissance targets with a third party. NexusEye brings that capability in-house. You define the targets, you control the data, and you search without limits.


🎯 Key Capabilities

🔍 Deep Search Capabilities

  • Elasticsearch Core: Lightning-fast full-text search across aggregated device data.
  • Granular Queries: Search by port:22, country:US, service:ssh, or has_vuln:true.
  • Faceted Filtering: Real-time sidebars allowing you to drill down into millions of records.

📡 High-Velocity Async Scanner

  • Concurrent Execution: Achieve 500+ concurrent TCP connections via Python asyncio.
  • Protocol-Aware Grabbing: Automatically interact with and pull banners from 30+ services.
  • Masscan & Nmap Integration: Leverage industry-standard tools for extreme host discovery and deep OS fingerprinting.

🛡️ Automated Threat Intelligence

  • CVE Matching Engine: Instantly cross-reference detected services and versions with known vulnerabilities.
  • CVSS Scoring: Prioritize critical threats with built-in severity classification.
  • Global Enrichment: Automatic MaxMind GeoIP (City/ASN), reverse DNS, and WHOIS lookups applied to every discovered host.

💎 Elite Visual Interface

  • Cyber-Luxury Aesthetic: A premium dark-mode UI built with React and Framer Motion.
  • Interactive 3D Globe: Visualize your reconnaissance targets globally in real-time.
  • Live WebSockets: Watch scan progress, discoveries, and metrics update instantly on your dashboard.

🏗️ System Architecture

NexusEye employs a scalable microservices architecture orchestrated via Docker Compose.

graph TD
    %% Styling
    classDef frontend fill:#0a0a0a,stroke:#00f0ff,stroke-width:2px,color:#fff;
    classDef api fill:#0a0a0a,stroke:#8b5cf6,stroke-width:2px,color:#fff;
    classDef worker fill:#0a0a0a,stroke:#ff2a5f,stroke-width:2px,color:#fff;
    classDef db fill:#0a0a0a,stroke:#00e676,stroke-width:2px,color:#fff;

    %% Nodes
    UI[Frontend<br/>React / Vite / Framer]:::frontend
    API[Backend API<br/>FastAPI / Uvicorn]:::api
    Worker[Celery Workers<br/>Async Scanner]:::worker
    
    PG[(PostgreSQL<br/>Users & Scans)]:::db
    ES[(Elasticsearch<br/>Devices & Banners)]:::db
    Redis[(Redis<br/>Queue & PubSub)]:::db

    %% Connections
    UI <-->|REST / WebSockets| API
    API -->|Read/Write| PG
    API -->|Search/Index| ES
    API -->|Enqueue Tasks| Redis
    
    Redis -->|Dequeue Tasks| Worker
    Worker -->|Index Results| ES
    Worker -->|Update Status| PG
    Worker -->|Progress Events| Redis
Loading

🚀 Deployment Guide

Deploy the entire stack—database, search engine, task queue, backend, and frontend—in minutes using Docker.

Prerequisites

  • Docker
  • Docker Compose (v2.0+)

1-Minute Launch

# 1. Clone the repository
git clone https://github.com/mrceha/NexusEye.git
cd NexusEye

# 2. Copy the environment template
cp .env.example .env

# 3. Launch the entire stack in detached mode
docker compose up -d

Access Points

Service Local URL Description
Frontend UI http://localhost:5173 The primary user interface.
API Docs http://localhost:8000/api/docs Interactive Swagger documentation.

🔎 Advanced Search Syntax

The NexusEye search bar supports a powerful, composable query language designed for precision targeting.

Filter Example Description
Free Text apache Search across all banners, products, and hostnames.
Port port:443 Filter by a specific open TCP/UDP port.
Service service:ssh Filter by the detected protocol/service signature.
Product product:nginx Filter by the identified software product name.
Location country:DE Filter by ISO 3166-1 alpha-2 country code.
Network asn:13335 Filter by Autonomous System Number.
Threats has_vuln:true Restrict results to devices with known CVEs.
Chained nginx country:US port:443 has_vuln:true Combine any number of filters for extreme granularity.

⚖️ Legal & Responsible Use

⚠️ WARNING: NexusEye is a powerful network reconnaissance tool. It is intended strictly for authorized security testing, penetration testing engagements, and network administration.

  • You must obtain explicit, written authorization before scanning any network or device you do not own.
  • Unauthorized scanning may constitute a criminal offense under laws such as the CFAA (US) or Computer Misuse Act (UK).
  • The developers and maintainers assume zero liability for any misuse, damage, or legal consequences resulting from the use of this software.


📝 License & Attribution

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).
See the LICENSE file for the full text.

IMPORTANT: Use of this software requires strict compliance with the NOTICE file, which mandates clear, unmodified attribution to the original author in all source code, documentation, and user interfaces.


Designed, Architected, and Engineered by
@mrceha

Releases

No releases published

Packages

 
 
 

Contributors