E-mails, subdomains and names Harvester - OSINT
Find a file
L1ghtn1ng 13a0cdd62a Add async pagination helper and update pytest settings
Introduce the `next_page_or_end` method in `githubcode.py` to handle pagination. Additionally, modify the test case and upgrade pytest settings in `pyproject.toml` to the latest versions, ensuring compatibility and updated configurations.
2024-10-27 01:02:05 +01:00
.github Move continue-on-error for Python 3.13 to individual steps 2024-10-16 05:51:41 +01:00
bin Update Python version requirements and clean up code 2024-10-16 03:27:09 +01:00
README Update CONTRIBUTING.md 2020-04-02 10:06:59 +02:00
requirements Bump ruff from 0.7.0 to 0.7.1 2024-10-24 23:02:17 +01:00
tests Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
theHarvester Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
.dockerignore fix docker file and move it to use ubuntu and add docker ignore file 2021-06-28 21:37:47 +01:00
.git-blame-ignore-revs update run formatter commit 2023-07-26 22:10:19 -04:00
.gitattributes
.gitignore update deps and gitignore 2022-10-31 00:50:38 +00:00
docker-compose.yml Update Docker settings and shift to pipx for module installation 2023-12-18 16:34:06 +00:00
Dockerfile Properly clean up apt footprint in Dockerfile 2024-06-18 01:27:45 +08:00
pyproject.toml Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
README.md Update README.md 2024-10-26 17:56:31 +01:00
requirements.txt added requirements.txt 2019-12-31 13:23:32 -05:00
restfulHarvest.py reformat with ruff 2024-08-07 19:28:52 +01:00
theHarvester-logo.png Update theHarvester-logo.png 2019-09-10 23:14:45 +02:00
theHarvester-logo.webp add webp format of theHarvester logo 2023-02-05 14:57:27 +00:00
theHarvester.py fix typo 2024-10-26 17:54:56 +01:00

theHarvester

TheHarvester CI TheHarvester Docker Image CI Rawsec's CyberSecurity Inventory

What is this?

theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
multiple public resources that include:

Passive modules:

Active modules:

  • DNS brute force: dictionary brute force enumeration
  • Screenshots: Take screenshots of subdomains that were found

Modules that require an API key:

Documentation to setup API keys can be found at - https://github.com/laramies/theHarvester/wiki/Installation#api-keys

  • bevigil - Free upto 50 queries. Pricing can be found here: https://bevigil.com/pricing/osint
  • binaryedge - $10/month
  • bing
  • bufferoverun - uses the free API
  • censys - API keys are required and can be retrieved from your Censys account.
  • criminalip
  • fullhunt
  • github
  • hunter - limited to 10 on the free plan, so you will need to do -l 10 switch
  • hunterhow
  • intelx
  • netlas - $
  • onyphe -$
  • pentestTools - $
  • projecDiscovery - invite only for now
  • rocketreach - $
  • securityTrails
  • shodan - $
  • tomba - Free up to 50 search.
  • zoomeye

Install and dependencies:

Comments, bugs, and requests:

Main contributors:

  • Twitter Follow Matthew Brown @NotoriousRebel1
  • Twitter Follow Jay "L1ghtn1ng" Townsend @jay_townsend1
  • Twitter Follow Lee Baird @discoverscripts

Thanks:

  • John Matherly - Shodan project
  • Ahmed Aboul Ela - subdomain names dictionaries (big and small)