All Projects β†’ spyse-com β†’ go-spyse

spyse-com / go-spyse

Licence: MIT license
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to go-spyse

Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints πŸ”Ž
Stars: ✭ 252 (+908%)
Mutual labels:  osint, cybersecurity, reconnaissance
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+2064%)
Mutual labels:  osint, cybersecurity, reconnaissance
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+992%)
Mutual labels:  osint, cybersecurity, reconnaissance
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+27428%)
Mutual labels:  osint, cybersecurity, reconnaissance
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+80%)
Mutual labels:  osint, cybersecurity, reconnaissance
Certeagle
Weaponizing Live CT logs for automated monitoring ofΒ assets
Stars: ✭ 78 (+212%)
Mutual labels:  osint, cybersecurity, reconnaissance
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+13656%)
Mutual labels:  osint, reconnaissance
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+800%)
Mutual labels:  osint, cybersecurity
I See You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+884%)
Mutual labels:  osint, reconnaissance
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+1084%)
Mutual labels:  cybersecurity, reconnaissance
Pdlist
A passive subdomain finder
Stars: ✭ 204 (+716%)
Mutual labels:  osint, reconnaissance
Investigo
πŸ”Ž Find usernames and download their data across social media.
Stars: ✭ 168 (+572%)
Mutual labels:  osint, reconnaissance
SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎πŸ”₯
Stars: ✭ 132 (+428%)
Mutual labels:  osint, reconnaissance
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (+848%)
Mutual labels:  osint, cybersecurity
Osint Framework
OSINT Framework
Stars: ✭ 3,348 (+13292%)
Mutual labels:  osint, reconnaissance
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+52%)
Mutual labels:  osint, cybersecurity
flydns
Related subdomains finder
Stars: ✭ 29 (+16%)
Mutual labels:  osint, reconnaissance
Hack4Squad
πŸ’€ A bash hacking and scanning framework.
Stars: ✭ 45 (+80%)
Mutual labels:  osint, cybersecurity
urlRecon
πŸ“ urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+24%)
Mutual labels:  cybersecurity, reconnaissance
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (+16%)
Mutual labels:  osint, cybersecurity

Spyse API wrapper for Go

The official wrapper for spyse.com API, written in Golang, aimed to help developers build their integrations with Spyse.

Spyse is the most complete Internet assets search engine for every cybersecurity professional.

Examples of data Spyse delivers:

  • List of 300+ most popular open ports found on 3.5 Billion publicly accessible IPv4 hosts.
  • Technologies used on 300+ most popular open ports and IP addresses and domains using a particular technology.
  • Security score for each IP host and website, calculated based on the found vulnerabilities.
  • List of websites hosted on each IPv4 host.
  • DNS and WHOIS records of the domain names.
  • SSL certificates provided by the website hosts.
  • Structured content of the website homepages.
  • Abuse reports associated with IPv4 hosts.
  • Organizations and industries associated with the domain names.
  • Email addresses found during the Internet scanning, associated with a domain name.

More information about the data Spyse collects is available on the Our data page.

Spyse provides an API accessible via token-based authentication. API tokens are available only for registered users on their account page.

For more information about the API, please check the API Reference.

Installation

go get github.com/spyse-com/go-spyse

Quick start

// Add import
import "github.com/spyse-com/go-spyse/pkg"
// ...

// Use your API key to init the client
client, err := spyse.NewClient("XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", nil)

// Create a new service suitable for your case
svc := spyse.NewDomainService(client)

// Fetch all information about the domain
details, err := svc.Details(context.Background(), "tesla.com")
// ...

Examples

Account:

Target info:

Search with params (up to 10 000 results):

Scroll search (unlimited results):

Historical records:

Bulk Search:

Note: You need to pass access_token as an argument to run any example:

go run ./examples/domain_details/main.go --access_token=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX

Errors handling

To properly handle Spyse errors, assert them to spyse.ErrResponse and then check the "Code" field.

spyseError := err.(*spyse.ErrResponse)
// Error message, e.g. "wrong access token provided"
println(spyseError.Err.Message)
// Status code for request to API, e.g. 401
println(spyseError.Err.Status)
// Error text code, e.g. "unauthorized"
println(spyseError.Err.Code)

// Check for "limit reached" error
if spyseError.Err.Code == spyse.CodeRequestsLimitReached {
// ...
}

A list of error codes can be found in pkg/error.go

Testing

Run tests:

go test $(go list ./... | grep -v /examples/)

Run tests and create code coverage report:

go test $(go list ./... | grep -v /examples/) -race -coverprofile=coverage.txt -covermode=atomic

Covered API endpoints

All the available API methods are fully supported.

License

Distributed under the MIT License. See LICENSE for more information.

Troubleshooting and contacts

For any proposals and questions, please write at:

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].