The Asgard Framework is a modular, open-source, AI-assisted offensive security and red teaming toolkit. It combines classic penetration testing workflows with automated intelligence gathering, exploitation, reporting, and chaining across multiple phases of simulated attacks.
Developed by The Divinity Project, Asgard is distributed under the MIT license with a strong emphasis on lawful use, research, and education.
- Detects: XSS, SQLi, SSRF, IDOR, CRLF, SSTI, RCE, Path Traversal, XXE, Open Redirect, WebSocket, CSRF, Host Header Injection, OAuth misconfigurations, Authentication bypass
- JSON output + AI-enhanced CVSS summaries
- Integrates with Norns for report generation
- Full-range Nmap scanner
- Header spoofing, rate controls, stealth options
- Scans passed to Baldur for CVE correlation
- WHOIS, subdomain bruteforce, email & social lookup
- GitHub leak checks, Shodan, and metadata from images
- All data written to
intel.json
- Scans S3 buckets, public cloud assets
- GitHub token search via API
- DNS takeover detection and reporting
- Pulls CVEs from online databases (e.g. Exploit-DB, NVD)
- Matches CVEs to software detected by Thor
- Exploit proof-of-concept test and results
- Tor crawler with .onion search capabilities
- Keyword-based intelligence collection
- Fully contained over SOCKS5
- Probes for CDN, firewall, rate-limiting behavior
- Blacklist checks for known IP reputation
- Flags WAF fingerprints via headers and behavior
- Supports cron jobs, Windows tasks, basic backdoors
- Integrates with SET (Social Engineer Toolkit)
- AI-suggested persistence logic
- Aggregates intel from all modules
- Scores risks CVSS-style
- Prepares data for final report
- Creates
.pdfreports w/:- CVSS scoring
- Graphs
- AI summaries
- Recommendations
- Compiles
intel.jsondata into final documents
- REPL Agent (Yggdrasil)
- Report writing (Norns)
- Exploit crafting (Baldur)
- Chain simulation (Mimir)
To enable:
export OPENAI_API_KEY=your_api_key_hereEach module accepts target from environment:
export ASGARD_TARGET=https://example.com
export ASGARD_REPORTS_DIR=./reports/example
python3 freya/freya_alpha.pypython3 yggdrasil/yggdrasil_alpha.pypython3 yggdrasil/yggdrasil_agent.pyscan for open portsrun full web scangenerate reportfetch recent exploits
Drop plugins into /plugins with:
def run_plugin(target, config):
...They will be automatically detected and can be called via agent.
Run tests in /tests:
python3 tests/module_test_suite.pydocker-compose up --buildDocker will auto-run Yggdrasil in AI agent mode if OPENAI_API_KEY is passed.
Output files:
*.jsonper moduleintel.json– Unified datareport.pdf– Final deliverable
Asgard is for:
- Licensed red teams
- Security researchers
- Educators
- CTFs
Not for unauthorized use.
- Repo: https://github.com/binarymass/TheDivinityProject-Asgard
- License: MIT + extended liability disclaimer
- Docs: (This file)
- Manual:
Asgard_User_Manual.md - Contact: The Divinity Project via GitHub
Asgard is an evolving platform. You are encouraged to fork, contribute, and report issues. Use responsibly.