Skip to content

Welcome to Hive Platform Documentation

🐝 The Ultimate Attack Surface Management Platform

Hive is a comprehensive, enterprise-grade attack surface management and penetration testing platform designed for security professionals, red teams, and ethical hackers.

What You'll Find Here

This documentation provides complete, end-to-end guidance for using the Hive Platform and APHIDS CLI to conduct security assessments, manage attack surfaces, and automate penetration testing workflows.

📚 Documentation Sections

🎯 Getting Started

New to Hive? Start here to understand the platform, set up your environment, and run your first scan.

Get Started →

🌐 Hive Platform

Complete guide to the web-based Hive platform including asset management, attack strategies, and intelligence gathering.

Explore Hive →

⚡ APHIDS CLI

Master the command-line interface for automated security testing, including installation, configuration, and advanced usage.

Learn APHIDS →

🔄 Workflows

End-to-end workflows for common security testing scenarios, from penetration tests to continuous monitoring.

View Workflows →

Resource Description
Quick Start Guide Get up and running in 5 minutes
Architecture Overview Understand how Hive works
APHIDS Installation Install the CLI tool
API Reference Integrate with Hive programmatically
FAQ Common questions answered

Key Features

🎯 Attack Surface Management

  • Comprehensive Asset Discovery: Automatically discover and map URLs, hosts, IPs, ports, DNS records, and applications
  • Relationship Mapping: Visualize connections between assets with interactive graph views
  • Continuous Monitoring: Track changes to your attack surface over time

🚀 Automated Testing

  • Runbooks: Pre-configured security testing workflows
  • Attack Trees: Complex, multi-stage attack scenarios
  • Module Library: Extensive collection of security testing tools (Nmap, Amass, Wapiti, Nikto, and more)

📊 Intelligence & Reporting

  • Vulnerability Management: Track and prioritize discovered vulnerabilities
  • Finding Analysis: Detailed security findings with remediation guidance
  • Custom Reports: Generate professional reports for stakeholders

🔧 Enterprise Features

  • Campaign Management: Organize multiple engagements
  • Team Collaboration: Multi-user support with role-based access
  • API Integration: Automate workflows with RESTful API

Platform Components

Hive Web Platform

The web-based interface provides a comprehensive dashboard for managing your security operations:

  • Dashboard: Real-time overview of your attack surface
  • Asset Inventory: Centralized view of all discovered assets
  • Attack Platform: Create and execute security testing strategies
  • Automation Engine: Schedule and monitor scan executions
  • Intelligence Hub: Analyze vulnerabilities and findings

APHIDS CLI

The command-line interface for power users and automation:

  • Docker-Based: Isolated, reproducible testing environment
  • Online/Offline Modes: Work with or without Hive platform connectivity
  • Flexible Configuration: YAML-based configuration for easy customization
  • Extensive Module Support: Access to dozens of security testing tools

Who Is This For?

🎭 Penetration Testers

Streamline your testing workflow with automated reconnaissance and vulnerability discovery.

🔴 Red Teams

Plan and execute complex attack scenarios with attack trees and runbooks.

🛡️ Security Teams

Continuously monitor your attack surface and track vulnerabilities.

🏢 Consultants

Manage multiple client engagements with campaign and organization features.

System Requirements

Hive Platform (Web)

  • Modern web browser (Chrome, Firefox, Safari, Edge)
  • Internet connection
  • Valid Hive license

APHIDS CLI

  • Operating System: Linux, macOS, or Windows (with WSL2)
  • Docker: Version 20.10 or higher
  • Python: Version 3.8 or higher
  • Memory: Minimum 4GB RAM (8GB recommended)
  • Disk Space: Minimum 10GB free space

Docker Alternatives Coming Soon

We're working on support for Podman and other container runtimes. Stay tuned!

Getting Help

Need assistance? We've got you covered:

Next Steps

Ready to dive in? Here's what we recommend:

  1. Understand Key Concepts - Learn the terminology and concepts
  2. Quick Start Guide - Run your first scan in minutes
  3. Install APHIDS CLI - Set up the command-line tool
  4. Explore Workflows - See real-world usage examples

🚀 Ready to Get Started?

Jump into the Getting Started Guide and begin securing your attack surface today!

Documentation Version

This documentation is for Hive Platform v1.x and APHIDS CLI v1.2.x. Always ensure you're using the latest version for the best experience.