All Projects → natlas → Natlas

natlas / Natlas

Licence: apache-2.0
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Natlas

Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+932.73%)
Mutual labels:  reconnaissance, recon, infosec, scanning
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+665.17%)
Mutual labels:  reconnaissance, recon, nmap, scanning
k8s-nuclei-templates
Nuclei templates for K8S security scanning
Stars: ✭ 85 (-74.47%)
Mutual labels:  infosec, scanning, reconnaissance
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-74.47%)
Mutual labels:  infosec, recon, reconnaissance
Megplus
Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (-19.52%)
Mutual labels:  infosec, reconnaissance, recon
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-49.85%)
Mutual labels:  nmap, recon, reconnaissance
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-57.36%)
Mutual labels:  infosec, recon, reconnaissance
Autosetup
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-57.96%)
Mutual labels:  infosec, reconnaissance, recon
Spaces Finder
A tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-63.36%)
Mutual labels:  infosec, reconnaissance, recon
Awesome Asset Discovery
List of Awesome Asset Discovery Resources
Stars: ✭ 1,017 (+205.41%)
Mutual labels:  infosec, reconnaissance, recon
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-51.05%)
Mutual labels:  infosec, reconnaissance, nmap
flydns
Related subdomains finder
Stars: ✭ 29 (-91.29%)
Mutual labels:  infosec, recon, reconnaissance
asnap
asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-91.59%)
Mutual labels:  nmap, recon
OffensiveCloudDistribution
Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (-74.17%)
Mutual labels:  recon, scanning
mailcat
Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬
Stars: ✭ 219 (-34.23%)
Mutual labels:  recon, reconnaissance
osmedeus-workflow
Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own
Stars: ✭ 26 (-92.19%)
Mutual labels:  infosec, recon
querytool
Querytool is an OSINT framework based on Google Spreadsheets. With this tool you can perform complex search of terms, people, email addresses, files and many more.
Stars: ✭ 104 (-68.77%)
Mutual labels:  recon, reconnaissance
Argos
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-78.08%)
Mutual labels:  infosec, reconnaissance
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-87.09%)
Mutual labels:  infosec, reconnaissance
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-74.17%)
Mutual labels:  scanning, reconnaissance

Natlas

Last Commit Release Contributors License

Maintainability Total alerts pre-commit Code style: black

Server downloads Agent downloads

Summary

You've got a lot of maps and they are getting pretty unruly. What do you do? You put them in a book and call it an atlas. This is like that, except it's a website and it's a collection of nmaps. Natlas' objective is to make it easy to perform continuous scanning and review collected data.

The goal of Natlas is not to identify a bunch of vulnerabilities, necessarily, but rather to identify exposure. Perhaps you want to make sure that no one is running ssh with password auth enabled. Or perhaps you want to look for any exposed nfs, smb, or rsync shares. Maybe you want to look for expiring or expired ssl certificates, or weak ssl ciphers being used. Since Natlas uses the popular nmap port scanner, you can easily use any default nmap scripts in your scans.

Getting Started

To get started with your own deployment of Natlas, you're going to need a minimum of one elasticsearch node, one Natlas server and one Natlas agent. The quickest way to accomplish this is to run all three of these containers on the same server. Installation instructions for the server and the agent are linked below in their associated readmes.

The required deployment order is as follows:

  1. Elasticsearch
  2. Natlas Server
  3. Natlas Agent(s)

Note: As of June 15, 2020, Natlas has moved to a docker-only deployment model.

Elasticsearch

Because the Natlas server requires a connection to Elasticsearch in order to launch correctly, you should make sure you have an Elasticsearch node available before continuing with the next step. If you've never used Elasticsearch before, follow Elastic's instructions for setting up a single node cluster with docker. Make sure to pay attention to the section on persisting the elastic data.

Natlas Server

The Natlas server controls agent orchestration, scan configuration, and provides search and browse for the data stored in Elastic.

See the Natlas Server README for instructions on installing the Natlas server.

Natlas Agent

The Natlas agent is what fetches work from the server and actually performs the scans.

See the Natlas Agent README for instructions on installing the Natlas agent.

Contributing

Please review our contribution guidelines for information on how to contribute to Natlas. To get started with development, please see Project Setup.

Code Of Conduct

This project strives to adhere to the code of conduct outlined in our code of conduct. Please review the code of conduct before contributing.

Security

Information about this project's security reporting guidelines as well as security related functionality are outlined in our Security guidelines.

Acknowledgements

Disclaimer

Natlas is a platform which makes use of many other open source projects, many of which have their own licenses. Natlas does not claim ownership of any projects that it uses, and does not represent any of said projects. To the best of the Natlas Author's knowledge, the use of these tools in the Natlas platform is not violating any licenses. Natlas is a free and open source project that does not make, nor seeks to make, any revenue from the use of the other open source tools in use.

For further inquiry about licensing, please see the respective projects' licenses.

License

Copyright 2020 0xdade
Copyright 2016-2018 Intel Corporation

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

   http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].