Clean up menu, add missing source.

This commit is contained in:
Lee Baird 2019-01-26 19:01:30 -06:00
parent 5fe84db11f
commit c23503bba2
3 changed files with 14 additions and 17 deletions

View file

@ -6,7 +6,7 @@
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
* *
* theHarvester 3.0.6 v213 *
* theHarvester 3.0.6 v235 *
* Coded by Christian Martorella *
* Edge-Security Research *
* cmartorella@edge-security.com *
@ -54,7 +54,7 @@ Passive:
* pgp: PGP key server - mit.edu
* securitytrails: Security Trails search engine, the world's largest repository<br>
* securityTrails: Security Trails search engine, the world's largest repository<br>
of historical DNS data (Requires API key, see below.) - www.securitytrails.com
* shodan: Shodan search engine, will search for ports and banners from discovered<br>

View file

@ -44,7 +44,7 @@ def banner():
print("* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *")
print("* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *")
print('* *')
print('* theHarvester 3.0.6 v213 *')
print('* theHarvester 3.0.6 v235 *')
print('* Coded by Christian Martorella *')
print('* Edge-Security Research *')
print('* cmartorella@edge-security.com *')

View file

@ -33,32 +33,29 @@
def start():
parser = argparse.ArgumentParser(
description='theHarvester is a open source intelligence gathering tool(OSINT) that is used for recon')
description='theHarvester is used for gathering open source intelligence on a company or domain')
parser.add_argument('-d', '--domain', help='company name or domain to search', required=True)
parser.add_argument('-l', '--limit', help='limit the number of search results, default=500', default=500, type=int)
parser.add_argument('-S', '--start', help='start with result number X, default=0', default=0, type=int)
parser.add_argument('-g', '--google-dork', help='use Google Dorks for google search', default=False,
action='store_true')
parser.add_argument('-g', '--google-dork', help='use Google Dorks for Google search', default=False, action='store_true')
parser.add_argument('-p', '--port-scan',
help='scan the detected hosts and check for Takeovers (21,22,80,443,8080) default=False, params=True',
default=False)
# parser.add_argument('-s', '--shodan', help='use Shodan to query discovered hosts, default=False, params=True', default=False, type=bool)
parser.add_argument('-s', '--shodan', help='use Shodan to query discovered hosts', default=False,
action='store_true')
parser.add_argument('-s', '--shodan', help='use Shodan to query discovered hosts', default=False, action='store_true')
parser.add_argument('-v', '--virtual-host',
help='verify host name via DNS resolution and search for virtual hosts params=basic, default=False',
default=False)
parser.add_argument('-e', '--dns-server', help='DNS server to use for lookup')
parser.add_argument('-t', '--dns-tld', help='perform a DNS TLD expansion discovery, default False', default=False)
parser.add_argument('-n', '--dns-lookup', help='enable DNS server lookup, default=False, params=True',
default=False)
parser.add_argument('-e', '--dns-server', help='DNS server to use for lookups')
parser.add_argument('-c', '--dns-brute', help='perform a DNS brute force on the domain', default=False,
action='store_true')
parser.add_argument('-n', '--dns-lookup', help='enable DNS server lookups, default=False, params=True', default=False)
parser.add_argument('-t', '--dns-tld', help='perform a DNS TLD expansion discovery, default=False', default=False)
parser.add_argument('-f', '--filename', help='save the results to an HTML and/or XML file', default='', type=str)
parser.add_argument('-b', '--source', help='''source: baidu, bing, bingapi, censys, crtsh, cymon, dogpile,
google, googleCSE, google-certificates, google-profiles,
hunter, linkedin, netcraft, pgp, securityTrails, threatcrowd,
trello, twitter, vhost, virustotal, yahoo, all''')
parser.add_argument('-b', '--source', help='''source: baidu, bing, bingapi, censys, crtsh, cymon,
dogpile, duckduckgo, google, googleCSE,
google-certificates, google-profiles, hunter,
linkedin, netcraft, pgp, securityTrails, threatcrowd,
trello, twitter, vhost, virustotal, yahoo, all''')
args = parser.parse_args()
try: