Armory – Tool to Correlate Pentest Modules Output

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information. It isn’t meant to replace any specific tool. It is meant to take the output from various tools, and use it to feed other tools.

Armory - Tool to Correlate Pentest Modules Output
Armory – Tool to Correlate Pentest Modules Output

Additionally, it is meant to be easily extendable. Don’t see a module for your favorite tool? Write one up! Want to export data in just the right format for your reporting? Create a new report!

Similar tool will be useful during a penetration testing to centralize the reports in a database and correlate the finding to run a further attack.

Current supported modules are:

  • AquatoneDiscover – A Tool for Domain Flyovers
  • DNSRecon – DNS Enumeration Script
  • Fierce – A DNS reconnaissance tool for locating non-contiguous IP space.
  • GobusterDNS
  • Gowitness – golang, web screenshot utility using Chrome Headless.
  • HeaderScanner – framework to test HTTP headers on a Pentest
  • Hydra
  • Ingestor
  • JexBoss
  • LinkedInt
  • Masscan
  • Nessus
  • Nikto
  • Nmap
  • PowerMeta
  • PyMeta
  • SSLScan
  • SampleModule
  • SampleToolModule
  • ShodanImport
  • Subfinder – a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
  • Sublist3r
  • TheHarvester
  • Tko-subs
  • URLScanner
  • Whois
  • Xsscrapy

You can read more and download this tool over here:

Notify of
Inline Feedbacks
View all comments