Obliv Documentation

Master the art of automated security testing with comprehensive workflows, visual tools, and powerful integrations.

What This Platform Is

Create automations and tools visually, run them fast on your own machine, and share with the community—just like publishing on Git. Obliv brings you local power, visual simplicity, and open sharing.

Visual Creation

Automate & build tools

Design workflows and tools by dragging blocks—no complex code required.

Local Execution

Fast & efficient

Run automations on your own machine, with speed and full control—no cloud required.

Community Sharing

Publish & collaborate

Share your workflows, get inspired by others, and collaborate easily.

Explore & Reuse

Marketplace & templates

Browse, copy, and adapt shared workflows—or export them for offline use.

Obliv unites the speed of local execution, the flexibility of visual automation, and the power of community sharing. Automate, share, and innovate—while keeping full control of your tools and data.

Quick Start

The fastest way to create, configure, and run your first workflow. Follow these simple steps to get started in minutes.

  1. 1

    Create Your Account

    Sign up and log in to access the workflow builder.

  2. 2

    Open the Builder

    Go to the visual editor page to start building.

  3. 3

    Build Your Workflow

    Drag and drop nodes, connect them, name your workflow, and save.

  4. 4

    Install the CLI

    Download the CLI tool for local workflow execution.

  5. 5

    Generate API Key

    Create your API key and authenticate in the CLI (auth <api_key>).

  6. 6

    Run the Workflow

    Use run -name <workflow> in the CLI to execute your workflow.

Pro Tip

You can explore advanced features like variables, flow control, and marketplace templates later — but this Quick Start gets you up and running in minutes.

Basic Concepts

Workflow Components

Nodes

Represent individual tools or actions in your workflow

Connections

Define execution order and data flow between nodes

Properties

Configuration parameters specific to each tool

Conditions

Conditional logic to control execution flow

Flow Control Components

Control Elements

Start Node

Flow Control
Start

Description: Entry point of your workflow

Usage: Every workflow must begin with a Start node

Properties: No configuration required

End Node

Flow Control
End

Description: Exit point of your workflow

Usage: Marks the end of an execution branch

Properties: No configuration required

If Condition

Condition
If

Description: Conditional execution based on criteria

Usage: Creates conditional branches in workflow

Properties: Condition to evaluate (e.g., "port 80 open")

Parallel

Condition
Parallel

Description: Execute multiple branches simultaneously

Usage: Optimizes performance by parallelizing tasks

Properties: Maximum number of parallel threads

Reconnaissance Tools

Network Discovery

Nmap

Reconnaissance
Nmap

Description: Network port and service scanner

Usage: Discover open ports and identify services

Properties:

  • Target: IP address or domain name
  • Scan Type: TCP, UDP, or SYN scan
  • Ports: Port range to scan (e.g., 1-1000)

Example configuration:

Target: example.com
Scan Type: TCP
Ports: 1-65535

Masscan

Reconnaissance
Masscan

Description: Ultra-fast port scanner

Usage: Rapid scanning of large IP address ranges

Properties:

  • Target: IP address range
  • Rate: Scan speed (packets/second)

Subdomain Enumeration

Enumeration Tools

Subfinder

Subdomain
Subfinder

Description: Passive subdomain enumeration

Usage: Discover subdomains through public sources

Properties:

  • Domain: Main domain to analyze
  • Sources: Data sources to use

Note: Requires API keys for certain sources (configurable in Settings)

Amass

Subdomain
Amass

Description: In-depth attack surface mapping

Usage: Active and passive subdomain enumeration

Properties:

  • Domain: Target domain
  • Timeout: Maximum execution time (minutes)

Example: Basic Reconnaissance

Simple Reconnaissance Workflow

Start
Subfinder
Nmap
Aquatone
End

Workflow Description

  1. Start: Initialize the workflow
  2. Subfinder: Enumerate subdomains of target domain
  3. Nmap: Port scan discovered subdomains
  4. Aquatone: Screenshot web services found
  5. End: Complete the workflow

Recommended Configuration

Subfinder:

Domain: example.com
Sources: all

Nmap:

Target: {subfinder_output}
Scan Type: TCP
Ports: 80,443,8080,8443

Terminal Commands

Command Line Interface

Basic Commands

help Display available commands
clear Clear terminal history
status Show current workflow status

Workflow Management

execute Start workflow execution
save Save current workflow
load Load workflow file
nodes List all workflow nodes

Terminal Tips

Use ↑ and ↓ arrows to navigate command history
Terminal displays real-time execution logs automatically

Best Practices

Recommendations for Effective Workflows

Modular Organization

Divide complex workflows into reusable modules

  • Create specialized sub-workflows
  • Use descriptive names for your nodes
  • Group tools by function

Performance Optimization

Maximize your scan efficiency

  • Use parallel execution when possible
  • Limit port ranges for Nmap
  • Configure appropriate timeouts

Security & Ethics

Follow security best practices

  • Always obtain permission before scanning
  • Respect API rate limits
  • Document your testing activities

Error Handling

Prepare workflows for error cases

  • Use conditions to handle failures
  • Implement retry mechanisms
  • Monitor execution logs