mirror of
https://github.com/laramies/theHarvester.git
synced 2024-09-20 15:26:31 +08:00
Clean up menu, add missing source.
This commit is contained in:
parent
5fe84db11f
commit
c23503bba2
|
@ -6,7 +6,7 @@
|
|||
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
|
||||
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
|
||||
* *
|
||||
* theHarvester 3.0.6 v213 *
|
||||
* theHarvester 3.0.6 v235 *
|
||||
* Coded by Christian Martorella *
|
||||
* Edge-Security Research *
|
||||
* cmartorella@edge-security.com *
|
||||
|
@ -54,7 +54,7 @@ Passive:
|
|||
|
||||
* pgp: PGP key server - mit.edu
|
||||
|
||||
* securitytrails: Security Trails search engine, the world's largest repository<br>
|
||||
* securityTrails: Security Trails search engine, the world's largest repository<br>
|
||||
of historical DNS data (Requires API key, see below.) - www.securitytrails.com
|
||||
|
||||
* shodan: Shodan search engine, will search for ports and banners from discovered<br>
|
||||
|
|
|
@ -44,7 +44,7 @@ def banner():
|
|||
print("* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *")
|
||||
print("* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *")
|
||||
print('* *')
|
||||
print('* theHarvester 3.0.6 v213 *')
|
||||
print('* theHarvester 3.0.6 v235 *')
|
||||
print('* Coded by Christian Martorella *')
|
||||
print('* Edge-Security Research *')
|
||||
print('* cmartorella@edge-security.com *')
|
||||
|
|
|
@ -33,32 +33,29 @@
|
|||
|
||||
def start():
|
||||
parser = argparse.ArgumentParser(
|
||||
description='theHarvester is a open source intelligence gathering tool(OSINT) that is used for recon')
|
||||
description='theHarvester is used for gathering open source intelligence on a company or domain')
|
||||
parser.add_argument('-d', '--domain', help='company name or domain to search', required=True)
|
||||
parser.add_argument('-l', '--limit', help='limit the number of search results, default=500', default=500, type=int)
|
||||
parser.add_argument('-S', '--start', help='start with result number X, default=0', default=0, type=int)
|
||||
parser.add_argument('-g', '--google-dork', help='use Google Dorks for google search', default=False,
|
||||
action='store_true')
|
||||
parser.add_argument('-g', '--google-dork', help='use Google Dorks for Google search', default=False, action='store_true')
|
||||
parser.add_argument('-p', '--port-scan',
|
||||
help='scan the detected hosts and check for Takeovers (21,22,80,443,8080) default=False, params=True',
|
||||
default=False)
|
||||
# parser.add_argument('-s', '--shodan', help='use Shodan to query discovered hosts, default=False, params=True', default=False, type=bool)
|
||||
parser.add_argument('-s', '--shodan', help='use Shodan to query discovered hosts', default=False,
|
||||
action='store_true')
|
||||
parser.add_argument('-s', '--shodan', help='use Shodan to query discovered hosts', default=False, action='store_true')
|
||||
parser.add_argument('-v', '--virtual-host',
|
||||
help='verify host name via DNS resolution and search for virtual hosts params=basic, default=False',
|
||||
default=False)
|
||||
parser.add_argument('-e', '--dns-server', help='DNS server to use for lookup')
|
||||
parser.add_argument('-t', '--dns-tld', help='perform a DNS TLD expansion discovery, default False', default=False)
|
||||
parser.add_argument('-n', '--dns-lookup', help='enable DNS server lookup, default=False, params=True',
|
||||
default=False)
|
||||
parser.add_argument('-e', '--dns-server', help='DNS server to use for lookups')
|
||||
parser.add_argument('-c', '--dns-brute', help='perform a DNS brute force on the domain', default=False,
|
||||
action='store_true')
|
||||
parser.add_argument('-n', '--dns-lookup', help='enable DNS server lookups, default=False, params=True', default=False)
|
||||
parser.add_argument('-t', '--dns-tld', help='perform a DNS TLD expansion discovery, default=False', default=False)
|
||||
parser.add_argument('-f', '--filename', help='save the results to an HTML and/or XML file', default='', type=str)
|
||||
parser.add_argument('-b', '--source', help='''source: baidu, bing, bingapi, censys, crtsh, cymon, dogpile,
|
||||
google, googleCSE, google-certificates, google-profiles,
|
||||
hunter, linkedin, netcraft, pgp, securityTrails, threatcrowd,
|
||||
trello, twitter, vhost, virustotal, yahoo, all''')
|
||||
parser.add_argument('-b', '--source', help='''source: baidu, bing, bingapi, censys, crtsh, cymon,
|
||||
dogpile, duckduckgo, google, googleCSE,
|
||||
google-certificates, google-profiles, hunter,
|
||||
linkedin, netcraft, pgp, securityTrails, threatcrowd,
|
||||
trello, twitter, vhost, virustotal, yahoo, all''')
|
||||
args = parser.parse_args()
|
||||
|
||||
try:
|
||||
|
|
Loading…
Reference in a new issue