0xSs0rZ
Ctrlk
  • Hello World
  • Whoami
  • Interesting Books
  • Pentest
    • CheckLists
    • Recon
      • Tools
      • Information Gathering
      • OSINT
      • Whois
      • Google Dorks
      • Git Dorks
      • Cloud
      • DNS Subdomain Enumeration
      • Virtual Host
      • Fingerprinting / Crawling
      • Host Discovery
    • Protocols
    • Brute force
    • Shells
    • File Transfer
    • Web attacks
    • API
    • Public Exploit
    • External Pentest
    • Internal Pentest
    • Privilege Escalation
    • Post Exploitation
    • Cracking
    • Thick Client Pentest
    • Wifi Pentest
    • Mobile Pentest
    • Configuration Audit / Hardening
    • Code Analysis
    • Tools
    • Search Engines
    • Cheatsheets
    • Note Keeping / Reporting / Admin Stuff
  • Cloud
    • Cloud VM
    • Enumeration
    • SSRF / RCE
    • Azure
    • AWS
    • GCP
    • Kubernetes
    • Tools
  • Labs
  • Antivirus Evasion - Defender
    • Mindmap
    • Defender Module for PowerShell
    • Static Analysis
    • Dynamic Analysis
    • AMSI Bypass
    • Process Injection
    • Open-Source Software
    • User Access Control (UAC)
    • AppLocker
    • LOLBAS / LOLDrivers / LOLESXi
    • PowerShell ConstrainedLanguage Mode, CLM
    • VBScript
    • Bypass all Powershell security features (AMSI,CLM)
    • Bypass AV Payload / Shells
    • Find Folder Exclusions
    • Resources
  • EDR BYPASS
    • Approches for Evasion
    • Tools
    • Obfuscation
    • EDR Killer
    • BYOVD
    • Spoof Command Line Arguments
    • Blind Spots
    • Living Off Security Tools / LOTTunels
    • Process Hollowing
    • Process Injection - Reverse Shell
    • Payload Creation
    • Shellcode Loader
    • MalDev
    • Malware Testing Lab
    • Resources
  • Red Team
    • OpSec / Anonymity
    • Initial Access
    • Infrastructure (phishing, C2, redirector)
    • C2
    • EDR / AV Bypass
    • Physical Penetration Testing
    • Bypass Bitlocker
    • Resources
  • CTF
    • OSINT
    • Forensic
    • Cryptography
    • Steganography
    • Write Up
Powered by GitBook
On this page
  1. Pentest
  2. Recon

Fingerprinting / Crawling

Banner Grabbing

curl -I inlanefreight.com

Wafw00f

wafw00f inlanefreight.com

Nikto

nikto -h inlanefreight.com -Tuning b

The -Tuning b flag tells Nikto to only run the Software Identification modules.

GHunt

ghunt spiderdal -u domain.com
Cloud

Crawling / Scrapping

URLFinder

LogoGitHub - projectdiscovery/urlfinder: A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.GitHub

Katana

LogoGitHub - projectdiscovery/katana: A next-generation crawling and spidering framework.GitHub

Gourlex

LogoGitHub - trap-bytes/gourlex: Gourlex is a simple tool that can be used to extract URLs and paths from web pages.GitHub

Hakrawler

LogoGitHub - hakluke/hakrawler: Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationGitHub

LazyEgg

LogoGitHub - schooldropout1337/lazyeggGitHub

Reconspider

Logoreconspider | Kali Linux ToolsKali Linux
LogoGitHub - 0xSs0rZ/Recon: reconGitHub

creepyCrawler

LogoGitHub - chm0dx/creepyCrawler: OSINT tool to crawl a site and extract useful recon info.GitHub

SecretOpt1c

LogoGitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!GitHub

Photon

LogoGitHub - s0md3v/Photon: Incredibly fast crawler designed for OSINT.GitHub
PreviousVirtual HostNextHost Discovery

Last updated 1 month ago

  • Banner Grabbing
  • Wafw00f
  • Nikto
  • GHunt
  • Crawling / Scrapping
  • URLFinder
  • Katana
  • Gourlex
  • Hakrawler
  • LazyEgg
  • Reconspider
  • creepyCrawler
  • SecretOpt1c
  • Photon
katana -u https://example.com -d 5 waybackarchive, commoncrawl, alienvault -kf -jc -fx -ef woff,css,png,svg,jpg,woff2,jpeg,gif,svg > results.txt
gourlex -t domain.com
pip3 install scrapy
$ wget https://academy.hackthebox.com/storage/modules/279/ReconSpider.zip
$ unzip ReconSpider.zip 
python3 ReconSpider.py http://inlanefreight.com
cat results.json