@@ -56,7 +56,7 @@ passive_recon(){
56
56
printf " \n${GREEN} [+] Horizontal domain correlation/acquisitions ${NORMAL} \n"
57
57
printf " ${NORMAL}${CYAN} Searching horizontal domains...${NORMAL} \n\n"
58
58
email=$( whois $domain | grep " Registrant Email" | egrep -ho " [[:graph:]]+@[[:graph:]]+" )
59
- curl -s -A " Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36" " https://viewdns.info/reversewhois/?q=$email " | html2text | grep -Po " [-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)" | tail -n +4 | head -n -1
59
+ curl -s -A " Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36" " https://viewdns.info/reversewhois/?q=$email " | html2text | grep -Po " [-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)" | tail -n +4 | head -n -1
60
60
61
61
printf " \n${GREEN} [+] ASN Lookup ${NORMAL} \n"
62
62
printf " ${NORMAL}${CYAN} Searching ASN number of a company that owns the domain...${NORMAL} \n\n"
@@ -100,6 +100,22 @@ passive_recon(){
100
100
domainName=" https://" $domain
101
101
python3 ~ /tools/GitDorker/GitDorker.py -t $github_token -d ~ /tools/GitDorker/Dorks/alldorksv3 -q $domain -o dorks.txt
102
102
103
+ if [ " $2 " = true ];
104
+ then
105
+ printf " \n${GREEN} [+] Whois results: ${NORMAL} \n" | notify -silent | cat whois.txt | notify -silent
106
+ printf " \n${GREEN} [+] Nslookup results: ${NORMAL} \n" | notify -silent | cat nslookup.txt | notify -silent
107
+ printf " \n${GREEN} [+] ASN Lookup results: ${NORMAL} \n" | notify -silent | cat asn.txt | notify -silent
108
+ printf " \n${GREEN} [+] WhatWeb results: ${NORMAL} \n" | notify -silent | cat whatweb.txt | notify -silent
109
+ printf " \n${GREEN} [+] SSL Checker results: ${NORMAL} \n" | notify -silent | cat ssl.txt | notify -silent
110
+ printf " \n${GREEN} [+] TheHarvester users results: ${NORMAL} \n" | notify -silent | cat users.txt | notify -silent
111
+ printf " \n${GREEN} [+] TheHarvester ips results: ${NORMAL} \n" | notify -silent | cat ips.txt | notify -silent
112
+ printf " \n${GREEN} [+] TheHarvester emails results: ${NORMAL} \n" | notify -silent | cat emails.txt | notify -silent
113
+ printf " \n${GREEN} [+] TheHarvester hosts results: ${NORMAL} \n" | notify -silent | cat hosts.txt | notify -silent
114
+ printf " \n${GREEN} [+] CloudEnum results: ${NORMAL} \n" | notify -silent | cat cloud.txt | notify -silent
115
+ printf " \n${GREEN} [+] GitDorker results: ${NORMAL} \n" | notify -silent | cat dorks.txt | notify -silent
116
+
117
+ fi
118
+
103
119
cd $actualDir
104
120
}
105
121
@@ -156,6 +172,16 @@ active_recon(){
156
172
printf " \n${GREEN} [+] Nmap ${NORMAL} \n"
157
173
printf " ${NORMAL}${CYAN} Searching open ports...${NORMAL} \n\n"
158
174
nmap -p- --open -T5 -v -n $domain -oN nmap.txt
175
+
176
+ if [ " $2 " = true ];
177
+ then
178
+ printf " \n${GREEN} [+] Robots.txt results: ${NORMAL} \n" | notify -silent | cat output_robot.txt | notify -silent
179
+ printf " \n${GREEN} [+] Hakrawler & gau results: ${NORMAL} \n" | notify -silent | cat paths.txt | notify -silent
180
+ printf " \n${GREEN} [+] Arjun results: ${NORMAL} \n" | notify -silent | cat parameters.txt | notify -silent
181
+ printf " \n${GREEN} [+] Secrets in JS results: ${NORMAL} \n" | notify -silent | cat secrefinder.txt | notify -silent
182
+ printf " \n${GREEN} [+] Dirsearch results: ${NORMAL} \n" | notify -silent | cat dirsearch | notify -silent
183
+ printf " \n${GREEN} [+] Nmap results: ${NORMAL} \n" | notify -silent | cat nmap.txt | notify -silent
184
+ fi
159
185
160
186
cd $actualDir
161
187
}
@@ -274,7 +300,7 @@ vulnerabilities(){
274
300
printf " \n${GREEN} [+] Vulnerability: SSRF${NORMAL} \n"
275
301
printf " ${NORMAL}${CYAN} Trying to find SSRF vulnerabilities...${NORMAL} \n\n"
276
302
printf " ${RED} [!] Remember to enter your Burp Collaborator link in the configuration.cfg file \n\n${NORMAL} "
277
- findomain -t $domain | httpx -silent -threads 1000 | gau | grep " =" | qsreplace $burpCollaborator
303
+ findomain -t $domain | httpx -silent -threads 1000 | gau | grep " =" | qsreplace $burpCollaborator | tee -a ssrf.txt
278
304
279
305
printf " \n${GREEN} [+] Vulnerability: XSS${NORMAL} \n"
280
306
printf " ${NORMAL}${CYAN} Trying to find XSS vulnerabilities...${NORMAL} \n\n"
@@ -285,12 +311,27 @@ vulnerabilities(){
285
311
gau $domain | gf sqli | tee sqli_paramaters.txt
286
312
printf " \n"
287
313
printf " ${NORMAL}${CYAN} Checking if the entry points are vulnerable...${NORMAL} \n\n"
288
- sqlmap -m sqli_paramaters.txt --batch --random-agent --level 1
314
+ sqlmap -m sqli_paramaters.txt --batch --random-agent --level 1 | tee -a sqli.txt
289
315
290
316
printf " \n${GREEN} [+] Vulnerability: Multiples vulnerabilities${NORMAL} \n"
291
317
printf " ${NORMAL}${CYAN} Running multiple templates to discover vulnerabilities...${NORMAL} \n\n"
292
318
nuclei -u $domain -t ~ /tools/nuclei-templates/ -severity low,medium,high,critical -silent -o mutiple_vulnerabilities.txt
293
319
320
+ if [ " $2 " = true ];
321
+ then
322
+ printf " \n${GREEN} [+] Missing headers results: ${NORMAL} \n" | notify -silent | cat headers.txt | notify -silent
323
+ printf " \n${GREEN} [+] Email spoofing results: ${NORMAL} \n" | notify -silent | cat spoof.json | notify -silent
324
+ printf " \n${GREEN} [+] Subdomain takeover results: ${NORMAL} \n" | notify -silent | cat takeover.txt | notify -silent
325
+ printf " \n${GREEN} [+] CORS results: ${NORMAL} \n" | notify -silent | cat cors.txt | notify -silent
326
+ printf " \n${GREEN} [+] 403 bypass results: ${NORMAL} \n" | notify -silent | cat bypass403.txt | notify -silent
327
+ printf " \n${GREEN} [+] Cross Site Request Forgery (CSRF/XSRF) results: ${NORMAL} \n" | notify -silent | cat csrf.txt | notify -silent
328
+ printf " \n${GREEN} [+] Open Redirect results: ${NORMAL} \n" | notify -silent | cat or_urls.txt | notify -silent
329
+ printf " \n${GREEN} [+] SSRF results: ${NORMAL} \n" | notify -silent | cat ssrf.txt | notify -silent
330
+ printf " \n${GREEN} [+] XSS results: ${NORMAL} \n" | notify -silent | cat xss.txt | notify -silent
331
+ printf " \n${GREEN} [+] SQLi results: ${NORMAL} \n" | notify -silent | cat sqli.txt | notify -silent
332
+ printf " \n${GREEN} [+] Nuclei results: ${NORMAL} \n" | notify -silent | cat mutiple_vulnerabilities.txt | notify -silent
333
+ fi
334
+
294
335
cd $actualDir
295
336
}
296
337
0 commit comments