All Projects → devanshbatham → Passivehunter

devanshbatham / Passivehunter

Licence: MIT license
Subdomain discovery using the power of 'The Rapid7 Project Sonar datasets'

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Passivehunter

Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+1793.98%)
Mutual labels:  bugbounty, subdomain-scanner, subdomain-finder
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+4962.65%)
Mutual labels:  bugbounty, subdomain-scanner
Priest
Extract server and IP address information from Browser SSRF
Stars: ✭ 13 (-84.34%)
Mutual labels:  bugbounty, bugbounty-tool
wordlist generator
Unique wordlist generator of unique wordlists.
Stars: ✭ 41 (-50.6%)
Mutual labels:  bugbounty, bugbounty-tool
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-45.78%)
Mutual labels:  bugbounty, bugbounty-tool
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+146.99%)
Mutual labels:  bugbounty, bugbounty-tool
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+934.94%)
Mutual labels:  bugbounty, subdomain-scanner
recce
Domain availbility checker
Stars: ✭ 30 (-63.86%)
Mutual labels:  bugbounty, subdomain-scanner
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+71.08%)
Mutual labels:  bugbounty, subdomain-scanner
VPS-Bug-Bounty-Tools
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (-46.99%)
Mutual labels:  bugbounty, bugbounty-tool
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+475.9%)
Mutual labels:  bugbounty, bugbounty-tool
cf-check
CloudFlare Checker written in Go
Stars: ✭ 147 (+77.11%)
Mutual labels:  bugbounty, bugbounty-tool
Payloads
Payload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (+407.23%)
Mutual labels:  bugbounty, bugbounty-tool
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-15.66%)
Mutual labels:  bugbounty, subdomain-finder
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-59.04%)
Mutual labels:  bugbounty, bugbounty-tool
Subdomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+1002.41%)
Mutual labels:  bugbounty, subdomain-scanner
continuous-nuclei
Running nuclei Continuously
Stars: ✭ 45 (-45.78%)
Mutual labels:  bugbounty, bugbounty-tool
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+101.2%)
Mutual labels:  bugbounty, bugbounty-tool
fdnssearch
Swiftly search FDNS datasets from Rapid7 Open Data
Stars: ✭ 19 (-77.11%)
Mutual labels:  bugbounty, rapid7
HostPanic
Find host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (-72.29%)
Mutual labels:  bugbounty, bugbounty-tool

PassiveHunter : not another subdo tool

Passivehunter

What is PassiveHunter ?

Passivehunter uses https://dns.bufferover.run for enumerating subdomains , This project uses the The Rapid7 Project Sonar datasets . dns.bufferover.run uses DNSGrep for quickly searching the the large data sets , Passivehunter enumerates the subdomains using query https://dns.bufferover.run/dns?q=<hostname>. It uses some regex magic to filter out the subdomains from the raw json output , then all the alive subdomains are filtered. It shows the status code of the alive subdomains. It is fast as it uses asynchronous requests instead of traditional synchronous requests.

Why PassiveHunter ?

I created this for my personal use , as enumerating the subdomains and filtering out the alive subdomains among hundreds of domains is a tedious task and ofcourse not a programmer way of doing things , Passivehunter automates all this , from filtering out the domains from raw json output to removing all the dead domains , It helped me a lot in finding a lot of potential hidden assets of the BB companies (And yes a lot of $$$$ bounties too) .

Compatability

It works on anything that has Python installed.

How to install and use ?

> mkdir Passive-hunter

> cd Passive-hunter

> git clone https://github.com/devanshbatham/Passivehunter

> sudo apt install python3.7 python3-venv python3.7-venv

> python3.7 -m venv py37-venv

> . py37-venv/bin/activate

> cd Passivehunter

> pip3 install -r requirements.txt

> python passivehunter.py domainname.tld

Files :

When a scan is successfully completed , 3 files are created

1 - domainname.txt : contains all domains dead + alive

2 - domainname-200.txt : contains domains with 200 status

3 - domainname-other.txt : contains domains with status other than 200.

Example Usage :

python passivehunter.py hackerone.com

Total Unique Subdomains Found Alive Subdomains

Credits :

Huge shoutout to erbbysam <3 .

You can read about DNSGREP here : https://blog.erbbysam.com/index.php/2019/02/09/dnsgrep/

Wanna show support for the tool ?

I will be more than happy if you will show some love for Animals by donating to Animal Aid Unlimited ,Animal Aid Unlimited saves animals through street animal rescue, spay/neuter and education. Their mission is dedicated to the day when all living beings are treated with compassion and love.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].