githubEdit

Reconnaissance

Subdomain enumeration

Subfinder

# List
subfinder -dL domains.txt -o subs.com 
# domain
subfinder -d test.com -o subs.com 

Amass

# passive
└─$ amass enum --passive -norecursive -noalts -d example.com -o example.com.subs

# Lsit 
└─$ amass enum --passive -norecursive -noalts -df domains.txt-o example.com.subs

# active
└─$ amass enum  -src -ip -brute -min-for-recursive 2 -d example.com -o example.com.subs

Assetfinder

SubEnum

TheHarvester

CRT

https://securitytrails.com/app/accountarrow-up-right

https://subdomainfinder.c99.nl/arrow-up-right

https://shrewdeye.app/arrow-up-right

google dorking

unique subdomain

Subdomain Takeover

Subzy

dig

nslookup

Live subdomain

Httpx all thing about targets

Httpx 200 status code

httpx all ips and ports on host

Port Scanning

using Shodan

Endpoints

waybackurl

Katana

gospider

unique

Auto scan

Information about target

Shodan

Dig

Extract IPs

Search in shodan using IPs

use for search on file : https://buckets.grayhatwarfare.com/arrow-up-right

Censys

https://search.censys.io/arrow-up-right

Directory

dirsearch

dirsearch files

JS files

waybackurls

API leak

mantra

nuclei

NMAP

Http request smuggling

Parameters

extract PHP file

Arjun

paramspider

unique

OSINT Framework

Shodan

Crunch base

information about target like Acquisition, contact info ,emails, etc...

Whois

information about target may use in subdomain takeover

403/unauthorized

bypass it by ~/403bypass]

Last updated