-
Clone or download the project:
git clone https://github.com/username/asta-scanner.git cd asta-scanner -
(Optional) Create and activate a virtual environment:
- Linux/macOS:
python3 -m venv venv source venv/bin/activate- Windows:
python -m venv venv venv\Scripts\activate
-
Install the required dependencies:
pip install -r requirements.txt
-
Run the
asta.pyscript:python asta.py
-
Enter the domain or IP of the target you want to scan and select the appropriate protocol (
httporhttps).
Collects information about the ownership of the domain and other related data, such as email addresses or administrative contacts.
Allows you to check the IP addresses associated with the target domain. This is important for network mapping or further analysis of server configuration.
AstaScannerV1 can detect if the website is using a specific CMS or framework (such as WordPress, Joomla, or Drupal). This helps identify the technology used and potential vulnerabilities.
This feature searches for commonly used admin panel URLs, such as /admin or /wp-admin, to expose potential entry points to the system.
Performs port scanning to find open ports, such as those for SSH, HTTP, HTTPS, and FTP. This can help identify services running on the target server.
Vulnerability scanning using Nuclei to detect potential vulnerabilities based on available exploit templates.
When a CMS is detected, AstaScannerV1 can attempt to automatically execute exploits against the CMS, if exploit scripts are available within the tool.
If you're interested in contributing to the development of AstaScannerV1, you can submit pull requests or report bugs by opening issues.
This project is licensed under the MIT License. See the LICENSE file for more details.