All Projects → ph4ntonn → Behold3r

ph4ntonn / Behold3r

Licence: MIT License
👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Behold3r

Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+2234.48%)
Mutual labels:  cybersecurity, pentest-tool, redteam
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+472.41%)
Mutual labels:  cybersecurity, pentest-tool, redteam
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+14389.66%)
Mutual labels:  subdomain, pentest-tool, subdomain-scanner
OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+17.24%)
Mutual labels:  cybersecurity, redteam
pentesting-dockerfiles
Pentesting/Bugbounty Dockerfiles.
Stars: ✭ 148 (+410.34%)
Mutual labels:  pentest-tool, redteam
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+31.03%)
Mutual labels:  cybersecurity, pentest-tool
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+193.1%)
Mutual labels:  information, cybersecurity
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+1341.38%)
Mutual labels:  pentest-tool, redteam
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+110.34%)
Mutual labels:  cybersecurity, redteam
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+172.41%)
Mutual labels:  cybersecurity, redteam
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+12710.34%)
Mutual labels:  pentest-tool, redteam
Teemo
A Domain Name & Email Address Collection Tool
Stars: ✭ 595 (+1951.72%)
Mutual labels:  information, subdomain
Information collection handbook
Handbook of information collection for penetration testing and src
Stars: ✭ 447 (+1441.38%)
Mutual labels:  information, subdomain
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+106.9%)
Mutual labels:  cybersecurity, redteam
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+934.48%)
Mutual labels:  information, pentest-tool
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+317.24%)
Mutual labels:  cybersecurity, pentest-tool
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+889.66%)
Mutual labels:  cybersecurity, pentest-tool
volana
🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (+31.03%)
Mutual labels:  pentest-tool, redteam
Getaltname
Extract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (+1003.45%)
Mutual labels:  subdomain, pentest-tool
Dumb
Dumain Bruteforcer - a fast and flexible domain bruteforcer
Stars: ✭ 54 (+86.21%)
Mutual labels:  subdomain, pentest-tool

Behold3r

Behold3r是一个子域名收集工具,因为受到了sublert的启发,就想着写点小玩意自娱自乐hhh

(仓促写成,远不够完善,持续改进中.....)

环境需求

Redis

Python3

使用截图

(以下是最初的截图,当前查询来源已经增加,懒得再截图了hhh)

对7k7k网站进行子域名收集,并检活后存放结果至redis中

1

对7k7k网站进行子域名收集,不进行检活也不放入redis,仅展示

2

将7k7k网站加入监控列表,并指定使用163邮箱接受监控邮件

3

收到邮件提醒

4

文件描述

Behold3r.py为主程序

config.py为配置文件,redis相关配置、线程数配置及未来功能的配置都存放在此文件

其中包括邮箱设置:

sender:发件人邮箱

authcode:发件人授权码(在邮箱设置中可以找到)

receiver:收件人邮箱

Email.py 为邮件发送代码

参数设置

-u --url:设置要查找的域名,形如:python Beholder.py -u http://www.example.com

-s --search:设置要查找的域名但不执行收集的操作,仅仅只是从redis数据库中查找保存的对应域名的子域名的历史数据,形如:python Beholder.py -s http://www.example.com

-o --output:将查询结果导出为txt文件, 需要与-s、-u等选项联用,不可单独使用(导出文件名为域名.txt)

-c --confirm:设置是否要对查找出来的子域名进行查活操作,形如:python Beholder.py -u http://www.example.com -c

-r --redis:设置是否需要将查找出来的子域名用redis进行保存,默认不保存。形如:python Beholder.py -u http://www.example.com -r

       (注意,当-r参数与-c参数连用时,只保存存活的子域名)

-t --timeout:设置查活操作线程的超时时间,默认为5s

-l --listing:显示所有正在被监控的域名,单独使用,不能和其他参数联用

-f --flush:移除指定邮箱下的所有监控域名,需要与-e选项联用,类似于-d选项

-p --pop:设置需要从监控列表里移除的域名,需要与-e选项联用,类似于-d选项

-e --email:设置接受监控信息的邮箱(现仅支持qq以及163邮箱),具体参数:-e 163(使用163邮箱) -e qq(使用qq邮箱)注意,此选项必须与-d选项联用

-d --domain:设置需要监控的域名,形如:-d http://www.4399.com 注意,此选项必须与-e选项联用

如果-e与-d选项联用,形如:python Beholder.py -d http://www.4399.com -e 163(即监控http://www.4399.com,监控邮件发送至163邮箱,具体邮箱地址及授权码配置请至config.py文件中配置,授权码教程(以qq为例):https://service.mail.qq.com/cgi-bin/help?subtype=1&id=28&no=1001256)

注意事项

若使用了域名监控功能,请手动使用crontab -e 命令将其变为定时任务(不知道这是啥的请自行百度。。。):

添加的内容类似如下:

* * * * * cd ~/code/Beholder && python Beholder.py -x

(前面五个 * 号表示每过一分钟执行,不知道使用方法者请自行百度。之后的cd语句只需改成你代码所在的目录即可)

如上设置,即可在邮箱中每分钟收到一次子域名变化信息

(Important!!!!!!!!!!!!!!!)另外,使用了域名监控功能时请保持redis服务器正常运行,且在设置定时任务之前执行一次 python Beholder.py -u (你要监控的域名) -c -r 获得初始数据

PS: 163邮箱如使用海外ip,可能导致无法接收邮件,请使用qq邮箱接收(后期会加上gmail邮箱)

Todo:

加入更多好用的子域名查询来源

。。。。。。。。

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].