AISHA is a powerful web-based security analysis platform designed for security researchers and penetration testers. It provides automated scanning and vulnerability assessment capabilities through an intuitive interface, combining multiple industry-standard security tools into a unified workflow.
project-aisha/
├── backend/ # Backend source code
├── frontend/ # Frontend source code
│ ├── public/ # Public assets
│ ├── src/ # React components and logic
│ └── package.json # Frontend dependencies
├── .env.example # Example environment variables
├── README.md # Project documentation
└── package.json # Backend dependencies
AISHA offers comprehensive security scanning capabilities including:
- Automated subdomain enumeration and analysis
- Web directory and file discovery
- Port scanning and service detection
- Vulnerability scanning with customizable templates
- Real-time scan progress monitoring
- Downloadable scan reports in multiple formats
- Historical scan comparison and tracking
- Rate-limited API endpoints for controlled access
- Node.js: Powers the core application server
- Express.js: Handles API routing and middleware integration
- MongoDB: Stores scan results and user configurations
- Mongoose: Provides MongoDB object modeling
- JWT: Implements secure authentication
- Nuclei: Advanced vulnerability scanning
- Amass: Robust subdomain enumeration
- Subfinder: Passive subdomain discovery
- Nmap: Network mapping and port analysis
- Gobuster: Directory brute-forcing
- HTTPx: Web server analysis
- React: Builds the user interface
- Vite: Fast development environment
- Tailwind CSS: Styles the components
- Redux: Manages application state
- Axios: Handles API communications
- Helmet.js: Implements security headers
- Rate Limiting: Prevents abuse
- CORS Protection: Controls cross-origin requests
- Input Validation: Ensures data integrity
- Request Logging: Tracks system usage
# Install required security tools
sudo apt update
sudo apt install -y nmap amass subfinder gobuster nuclei
# Install Node.js and npm
curl -fsSL https://deb.nodesource.com/setup_lts.x | sudo -E bash -
sudo apt install -y nodejs
# Install MongoDB
sudo apt install -y mongodb
# Clone the repository
git clone https://github.com/yourusername/project-aisha.git
cd project-aisha
# Install dependencies
npm install
# Set up environment variables
cp .env.example .env
# Edit .env with your configurations
# Start the development server
npm run dev
- Access the web interface at
http://localhost:3000
- Enter the target URL in the scan input field
- Configure scan options (optional)
- Initiate the scan
Initiates a new security scan
{
"url": "https://example.com",
"options": {
"deep_scan": false,
"port_scan": true
}
}
Retrieves scan status and results
{
"scanId": "uuid",
"status": "completed",
"results": {
"vulnerabilities": [],
"subdomains": [],
"ports": []
}
}
Downloads complete scan results as a ZIP file
- The tool is designed for authorized security testing only
- Always obtain proper permissions before scanning any target
- Rate limiting is implemented to prevent abuse
- API keys should be kept secure and rotated regularly
- Scan results may contain sensitive information
- Create a new Web Service on Render
- Connect your GitHub repository
- Configure environment variables:
MONGODB_URI
JWT_SECRET
RATE_LIMIT_WINDOW
RATE_LIMIT_MAX
- Set build command:
npm install
- Set start command:
npm start
We welcome contributions! Please follow these steps:
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Create a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- Project inspired by the need for automated security assessment tools
- Thanks to all the open-source security tools integrated into this project
- Special thanks to the security research community for their valuable feedback
For questions, feature requests, or bug reports, please open an issue in the GitHub repository or contact the maintainers directly.
Note: This tool is intended for security professionals and researchers. Always ensure you have proper authorization before conducting security assessments.