All Projects → melbadry9 → WhoEnum

melbadry9 / WhoEnum

Licence: MIT license
Mass querying whois records

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to WhoEnum

Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+595.83%)
Mutual labels:  enumeration, recon, bugbounty
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+950%)
Mutual labels:  enumeration, recon
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+658.33%)
Mutual labels:  enumeration, bugbounty
ScanApi
Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.
Stars: ✭ 34 (+41.67%)
Mutual labels:  recon, bugbounty
Rescope
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (+550%)
Mutual labels:  enumeration, bugbounty
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+579.17%)
Mutual labels:  enumeration, bugbounty
osint
Docker image for osint
Stars: ✭ 92 (+283.33%)
Mutual labels:  whois, recon
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+383.33%)
Mutual labels:  enumeration, recon
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+6450%)
Mutual labels:  enumeration, bugbounty
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+491.67%)
Mutual labels:  recon, bugbounty
roboxtractor
Extract endpoints marked as disallow in robots files to generate wordlists.
Stars: ✭ 40 (+66.67%)
Mutual labels:  enumeration, bugbounty
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 1,693 (+6954.17%)
Mutual labels:  enumeration, recon
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+7933.33%)
Mutual labels:  enumeration, bugbounty
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (+637.5%)
Mutual labels:  enumeration, recon
Autoenum
Automatic Service Enumeration Script
Stars: ✭ 134 (+458.33%)
Mutual labels:  enumeration, recon
fuzzmost
all manner of wordlists
Stars: ✭ 23 (-4.17%)
Mutual labels:  recon, bugbounty
ICU
An Extended, Modulair, Host Discovery Framework
Stars: ✭ 40 (+66.67%)
Mutual labels:  recon, bugbounty
Awsbucketdump
Security Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+4154.17%)
Mutual labels:  enumeration, bugbounty
Bugbounty Starter Notes
bug bounty hunters starter notes
Stars: ✭ 85 (+254.17%)
Mutual labels:  enumeration, recon
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+1125%)
Mutual labels:  recon, bugbounty

WhoEnum

Mass querying whois records using whois tool

Install

git clone http://github.com/melbadry9/WhoEnum.git;
cd WhoEnum; 
pip3 install .;

Help

$ whoenum -h 

usage: whoenum [-h] [-t THREADS] [-r RETRIES] [-d DOMAIN | -l LIST]

optional arguments:
  -h, --help            show this help message and exit
  -t THREADS, --threads THREADS
                        Number of threads
  -r RETRIES, --retries RETRIES
                        Number of retries after failure attempt
  -d DOMAIN, --domain DOMAIN
                        Use domains as a string sperated by ','
  -l LIST, --list LIST  Use list of domains

Example

$ whoenum -d alibaba.com | jq
{
  "domain_name": [
    "ALIBABA.COM",
    "alibaba.com"
  ],
  "registrar": "Alibaba Cloud Computing (Beijing) Co., Ltd.",
  "whois_server": "grs-whois.hichina.com",
  "referral_url": null,
  "updated_date": "2018-11-19 04:52:41",
  "creation_date": "1999-04-15 04:00:00",
  "expiration_date": "2023-05-23 19:54:58",
  "name_servers": [
    "NS1.ALIBABADNS.COM",
    "NS2.ALIBABADNS.COM"
  ],
  "status": [
    "clientTransferProhibited https://icann.org/epp#clientTransferProhibited",
    "serverDeleteProhibited https://icann.org/epp#serverDeleteProhibited",
    "serverTransferProhibited https://icann.org/epp#serverTransferProhibited",
    "serverUpdateProhibited https://icann.org/epp#serverUpdateProhibited"
  ],
  "emails": "[email protected]",
  "dnssec": "unsigned",
  "name": null,
  "org": null,
  "address": null,
  "city": null,
  "state": "zhe jiang",
  "zipcode": null,
  "country": "CN"
}

Thanks

This tool is based on python-whois

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].