All Projects → clirimemini → Keye

clirimemini / Keye

Licence: mit
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Keye

Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+592.08%)
Mutual labels:  monitoring-tool, hacking, penetration-testing, pentest, reconnaissance, bug-bounty
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+88.12%)
Mutual labels:  hacking, penetration-testing, reconnaissance, bug-bounty
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-57.43%)
Mutual labels:  penetration-testing, bug-bounty, pentest, reconnaissance
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+40.59%)
Mutual labels:  penetration-testing, bug-bounty, pentest, reconnaissance
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (+23.76%)
Mutual labels:  hacking, penetration-testing, pentest, bug-bounty
flydns
Related subdomains finder
Stars: ✭ 29 (-71.29%)
Mutual labels:  bug-bounty, pentest, reconnaissance
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+3257.43%)
Mutual labels:  hacking, penetration-testing, reconnaissance
Hacker101 Ctf
Hacker101 CTF Writeup
Stars: ✭ 295 (+192.08%)
Mutual labels:  hacking, penetration-testing, pentest
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+322.77%)
Mutual labels:  hacking, penetration-testing, reconnaissance
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+224.75%)
Mutual labels:  hacking, pentest, bug-bounty
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+356.44%)
Mutual labels:  hacking, penetration-testing, pentest
Habu
Hacking Toolkit
Stars: ✭ 635 (+528.71%)
Mutual labels:  hacking, penetration-testing, pentest
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+32483.17%)
Mutual labels:  hacking, penetration-testing, pentest
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+7074.26%)
Mutual labels:  hacking, penetration-testing, bug-bounty
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+3368.32%)
Mutual labels:  hacking, penetration-testing, pentest
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (+111.88%)
Mutual labels:  hacking, penetration-testing, pentest
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+249.5%)
Mutual labels:  hacking, penetration-testing, reconnaissance
Portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (+52.48%)
Mutual labels:  hacking, penetration-testing, pentest
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+61.39%)
Mutual labels:  hacking, pentest, reconnaissance
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+369.31%)
Mutual labels:  hacking, penetration-testing, pentest

What is Keye?

Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length. This tool is supposed to be scheduled to run periodically at fixed times, dates, or intervals (Ideally each day). Recognized changes of URLs will be sent to Slack workspace with a notification push.

Thanks to Yassine Aboukir for his help and support on this project.

Requirements

  • Virtual Private Server (VPS) running on Unix.
  • Python 2.x or 3.x.
  • Free Slack workspace.

Installation & Configuration

First of all, you will have to clone the tool from Github to your server:

$ git clone https://github.com/clirimemini/Keye.git && cd Keye

Install the dependencies:

$ pip install -r requirements.txt (or pip3 install -r requirements.txt)

Next step is to create a Slack workspace, to where new recognized changes of URLs will be sent to. Just browse to https://slack.com/ and create a free account.

Then, create a channel on your workspace.

Next, we need to generate a Webhook URL for our channel so we can leverage Slack API.

Browse to https://api.slack.com/apps and create a new application.

Browse to Incoming Webhooks and create a Webhook, and link it to the channel that we created previously.

You will obtain a link in the following format:

https://hooks.slack.com/services/XXXXXXX/BF0XXXXME/XXXXXXXXXXXXX

Copy that link and edit slackconfig.py

Now, we need to add a new Cron job to schedule execution of Keye at given time. To do it, type:

$ crontab -e

Add the following line at the end of the Cron file:

0 */12 * * * cd /root/Keye/ && /usr/bin/python /root/Keye/keye.py

Now, we're done with installing and configuring Keye.

Usage

$ python keye.py -h

Short Form Long Form Description
-s --singleurl Single URL to add. E.g: http://google.com
-ul --urlslist File with new URLs to add. E.g: urls.txt
-rm --remove URL to remove from database. E.g: http://google.com
-d --display Display all monitored URLs.

Feedback and issues?

If you have any feedback, anything that you want to see implemented or if you're running into issues using Keye, please feel free to file an issue on https://github.com/clirimemini/Keye/issues

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].