AegisScan Strategic is a professional, research-focused adversarial simulation framework designed for Purple Teams, Security Defenders, and Educational Cyber Ranges.
Unlike traditional vulnerability scanners that purely enumerate flaws, AegisScan simulates "mission-oriented" threat actor behavior—incorporating phases of reconnaissance, validation, and objective emulation—to rigorously test and improve organization detection capabilities.
Important
Research & Defense Only: This framework is strictly for defensive security research, authorized security assessments, and educational purposes. It is designed to help organizations validate their defenses, not to exploit unauthorized systems.
This framework is engineered for:
- Blue Teams & SOC Analysts: To generate realistic "attack noise" for tuning SIEM/EDR alerts.
- Purple Teams: To validate detection logic against specific adversarial behaviors.
- Cyber Range Administrators: To populate training environments with coherent, mission-driven traffic.
- Security Researchers: To study automated decision-making in adversarial contexts.
- Unauthorized Actors: The framework includes safety constraints and is not suitable for unauthorized offensive operations.
- "Point-and-Click" Exploitation: This is not a Metasploit alternative. It does not contain weaponized exploits or zero-days.
Most security tools blast network traffic indiscriminately. AegisScan introduces the concept of Strategic Missions:
- ROI-Aware Decision Engine: The system effectively "calibrates" itself; if the risk of detection (cost) outweighs the intelligence value (ROI) of a target, the engine disengages.
- Mission Profiles: Pre-defined logic sets for specific audit goals:
RECON: Passive and active information gathering.VALIDATION: Safe confirmation of misconfigurations.EMULATION: Replication of specific TTPs (Tactics, Techniques, and Procedures).
- Defensive Focus: Primed to generate realistic, attributable patterns that aid in SOC training and signature development.
This repository follows a Responsible Open-Core research model (see STRATEGY.md):
core/: The framework's engine, intelligence processing, and reporting subsystems.modules/: Standard wrappers for assessment tools (Nmap, various scanners) operating in safety modes.examples/: Educational reference implementations (e.g.,fast_port_scanner_demo.go).reports/: output location for structured JSON/Text mission reports.
Note: Aggressive evasion logic and weaponized modules are intentionally excluded from the open-core release to prevent misuse.
- Python 3.9+
- Nmap / Tshark (optional, for specific passive reconnaissance modules)
- Go (optional, for compiling example scanners)
- For API usage: install additional dependencies (
pip install -e .[api])
git clone https://github.com/Imposter-zx/AegisScan-OpenCore
cd AegisScan-OpenCore
pip install -r requirements.txtStandard Audit Mode (Safe) Runs a mission simulation to identify exposure without aggressive probing.
python main.py target.com --mode audit --mission reconContinuous Observation (Detection Training) Runs periodic, low-volume activity to test continuous monitoring alertness.
python main.py target.com --interval 60 --mode observationAPI Server Mode Start the RESTful API server for programmatic access and integration.
python api/server.pyThe API will be available at http://localhost:5000
AegisScan now includes an advanced vulnerability scanner with support for:
- Nuclei template-based scanning
- Nikto web server scanning
- Custom vulnerability checks
- Comprehensive reporting with severity levels
Reports can be generated in various formats:
- JSON (default)
- Text (human-readable)
- STIX 2.1 (for threat intelligence sharing)
- CEF (Common Event Format for SIEM integration)
Specify format with --output flag:
python main.py target.com --mode audit --mission recon --output stixConfigure webhook notifications in config.yaml to automatically send results to:
- SIEM platforms (Splunk, Elasticsearch)
- SOAR platforms
- Custom webhook endpoints
- Email notifications
The API includes JWT-based authentication:
- Obtain token:
POST /auth/loginwith username/password - Access protected endpoints: Include
Authorization: Bearer <token>header - Role-based access control (admin/operator/viewer)
By using this software, you agree to the terms in ETHICS.md. You strictly prohibited from using this tool against any target without explicit, written authorization.
This project is released under the GNU Affero General Public License v3.0 (AGPL-3.0). This ensures that the core research remains open and sets a barrier against the weaponization of this code in closed-source commercial attack platforms.
See LICENSE for the full text.
Created for the Advancement of Defensive Security Research.