amass
theHarvester
Our great sponsors
amass | theHarvester | |
---|---|---|
19 | 19 | |
11,069 | 10,182 | |
3.0% | - | |
7.5 | 9.4 | |
24 days ago | 4 days ago | |
Go | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
amass
-
amass VS dmut - a user suggested alternative
2 projects | 29 Nov 2023
-
findomain VS amass - a user suggested alternative
2 projects | 24 Nov 2023
-
Looking for Recommendations for New Vulnerability & PHI/PII Scanner
OWASP Zap, OWASP Amass, OpenVAS Scanner
-
Can authenticated internet-facing web app be discovered if not indexed by search engines?
My main source is Certificate Transparency, which is kind of a database of TLS certs created so far. But use external tools like Subfinder or Amass.
-
Millions of .git folders exposed publicly by mistake
Scan our domains and infrastructure to reveal if we have exposed.git repositories and other critical infrastructure. You can scan your domains and subdomains with many tools such as Amass or dirsearch to name a couple.
-
Tools for subdomain brute forcing
Amass = https://github.com/OWASP/Amass
-
A new free, open source, cross platform OSINT Tool
Mostly by researching the OSINT sources that other open source project pulls data from e.g amass, spiderfoot, the Harvetser etc
-
Awesome Penetration Testing
OWASP Amass - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.
- Laramies / TheHarvester Emails, Subdomains and Names Harvester – Osint
-
Clarification on Black Box Pentesting
On the subdomain part you may want to use amass https://github.com/OWASP/Amass
theHarvester
- Search for sensitive data using theHarvester and h8mail tools
- Whats that website employers can use to find all the sites your email address was used?
-
❇️ Information Gathering Tool Links
❇️ Harvester - collect emails, Subdomain, name, etc. 🔗 Link : https://github.com/laramies/theHarvester
-
University final year project
theHarvester is for OSINT.
-
Serach engines for hackers - updated
https://github.com/laramies/theHarvester - tool for finding emails, subdomains, IPs, etc. from various public data.
-
A new free, open source, cross platform OSINT Tool
Mostly by researching the OSINT sources that other open source project pulls data from e.g amass, spiderfoot, the Harvetser etc
- List of resources
- Good tools for finding emails of an organization
-
Good way to find business email from phone number / name of business?
theHarvester
- Laramies / TheHarvester Emails, Subdomains and Names Harvester – Osint
What are some alternatives?
subfinder - Fast passive subdomain enumeration tool.
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
assetfinder - Find domains and subdomains related to a given domain
masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
nuclei - Fast and customizable vulnerability scanner based on simple YAML based DSL.
Network-segmentation-cheat-sheet - Best practices for segmentation of the corporate network of any company
ZAP - The ZAP core project
Profil3r - OSINT tool that allows you to find a person's accounts and emails + breached emails 🕵️
h8mail - Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
rengine - reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.