AegisScan Strategic v4.0 is designed as a mission-aware adversarial simulation framework for defensive research, purple teaming, and security maturity assessment. Our goal is to provide security professionals with a tool that simulates sophisticated threat actor behaviors in a controlled, observable manner, enabling better detection engineering and response training.
To balance educational value with public safety, AegisScan adopts a Responsible Open-Core model.
- Core Architecture: The modular engine, event loop, and plugin system.
- Mission Logic: State machines defining "Recon," "Validation," and "Emulation" phases.
- Reporting Engine: Structured output formats for post-engagement analysis.
- Basic Scanners: Wrapper logic for standard tools (Nmap, etc.) in "Safety/Audit" modes.
- Defensive Mappings: MITRE ATT&CK correlation features.
- Evasion Logic: Advanced WAF bypass or EDR evasion techniques are removed from the public core to prevent misuse.
- Weaponized Exploits: No "point-and-click" exploit modules are included.
- Aggressive Automation: Logic designed for high-pressure DOS or brute-force is disabled or abstracted.
core/: The brain of the framework (Engine, Intelligence, Mission Control).modules/: Standard wrappers for assessment tools.examples/: Reference implementations (e.g.,fast_port_scanner_demo.go) for educational purposes.docs/: Architecture and usage documentation.reports/: Sample output templates.
We welcome contributions that improve defensive visibility, logging, reporting, and stability. Contributions adding unverified exploits or aggressive attack automation will be rejected to maintain the project's defensive research focus.