Connect ASNSPY to your existing security infrastructure
Real-time event streaming to security operations centers
--siem splunk --siem-host splunk.company.com:8088 \
--siem-token YOUR_HEC_TOKEN --siem-index security
Format: HTTP Event Collector (HEC) with JSON payloads
--siem elasticsearch --siem-host elastic.company.com:9200 \
--siem-token YOUR_API_KEY --siem-index asnspy
Format: ECS (Elastic Common Schema) compliant events
--siem qradar --siem-host siem.company.com:514 \
--siem-protocol tcp
Format: CEF (Common Event Format) via syslog
Instant alerts to team communication platforms
--webhook https://hooks.slack.com/services/YOUR/WEBHOOK/URL \
--webhook-type slack \
--webhook-events critical_finding,scan_complete
Rich attachments with color-coded severity and structured fields
--webhook YOUR_DISCORD_WEBHOOK_URL \
--webhook-type discord \
--webhook-severity CRITICAL
Embedded messages with icons and formatted content
--webhook YOUR_TEAMS_WEBHOOK \
--webhook-type teams
MessageCard format with actionable insights
--webhook YOUR_INTEGRATION_KEY \
--webhook-type pagerduty \
--webhook-events critical_finding
Creates incidents for CRITICAL findings with automatic deduplication
--webhook-severity CRITICAL # Only critical
--webhook-severity HIGH # High and critical
--webhook-severity MEDIUM # Medium, high, critical
--webhook-severity LOW # All findings
Persistent history, trending, and diff capabilities
--database # Uses asnspy.db in scan directory
Zero configuration, perfect for single-user workstations and testing
--database --db-type postgresql \
--db-host db.company.com --db-port 5432 \
--db-user scanner --db-pass $DB_PASS --db-name asnspy
Enterprise multi-user with ACID compliance
--database --db-type mysql \
--db-host mysql.company.com --db-port 3306 \
--db-user scanner --db-pass $DB_PASS --db-name asnspy
Widely deployed, excellent performance
Automatically creates and maintains tables for:
# Recent scan history
SELECT scan_id, start_time, findings_critical, findings_high
FROM scans ORDER BY start_time DESC LIMIT 10;
# Persistent vulnerabilities
SELECT cve_id, COUNT(*) as appearances
FROM findings WHERE finding_type='vulnerability'
GROUP BY cve_id HAVING COUNT(*) > 3;
ASNSPY fits seamlessly into existing enterprise infrastructure.
Request Early Access " '