ASRFacet-Rb
v1.0.0 | Workflow
Home Author & License License
Workflow
How It Works
ASRFacet-Rb is intentionally staged so one piece discovers context and the next piece validates or enriches it instead of trying to do everything at once.
AreaPurposeBuilt-In Capability
Passive DiscoveryCollect known assets before touching the targetCertificate transparency, passive DNS, historical archive data
Asset ValidationConfirm that discovered assets are real and in scopeDNS lookups, SAN pivots, scoped busting, resolution checks
Service MappingIdentify exposed network servicesThreaded TCP scanning and banner collection
Web ReconMap HTTP exposure and application behaviorHTTP probing, crawling, JavaScript endpoint mining
MonitoringHighlight change over timeRecon memory, diffs, and change summaries
Live Workflow View
The website renders the framework flow directly with HTML, CSS, and JavaScript so each stage stays readable and interactive.
Select a stage
Pick any stage to see what it contributes to the full framework workflow.
Workflow
Scan Pipeline
The full scan path is staged so operators can reason about where a finding came from and what should happen next.
01
Passive Runner
Collects baseline hostnames from passive providers before active traffic starts.
→ Output: subdomains, passive warnings
02
DNS + Certificate Discovery
Validates names and expands relationships through records and certificate SANs.
→ Output: IPs, records, certificate edges
03
Busting & Expansion
Tests candidate hosts and grows the known asset set in a controlled way.
→ Output: discovered hosts, candidates
04
Port & Service Mapping
Looks for reachable services on discovered IPs and collects basic banners.
→ Output: open ports, services, banners
05
HTTP + Crawl + JS
Maps application exposure, follows links, and mines probable endpoints from JavaScript.
→ Output: paths, links, forms, endpoints
06
Correlation + Monitoring
Scores assets, highlights likely findings, and compares the run against saved memory.
→ Output: findings, deltas, top assets, reports
Workflow
Passive Sources
Passive mode is the safest first view of a target and a good habit even for experienced operators.
crt.sh
Certificate Transparency
No Key
Great for SAN-derived hostnames
Wayback
Historical Archive
No Key
Older hosts and archived URLs
RapidDNS
Passive DNS
No Key
Simple hostname extraction
Shodan
Passive DNS
--shodan-key
Optional enrichment when you have a key
Workflow
Core Modules
Stability depends on keeping ownership tight: orchestration should not drift into engines, and storage should not drift into control flow.
LayerOwnsShould Not Own
SchedulerStage ordering, retries, admission controlProbe-specific business logic
EnginesActual DNS, port, HTTP, or crawl workGlobal orchestration policy
CorrelationResult interpretation and graph linksCompeting execution loops
OutputFormatting and persistenceDeciding what to scan next