E-mails, subdomains and names Harvester - OSINT
Go to file
dependabot[bot] 31722b18d5 chore(deps): bump uvicorn from 0.21.1 to 0.22.0
Bumps [uvicorn](https://github.com/encode/uvicorn) from 0.21.1 to 0.22.0.
- [Release notes](https://github.com/encode/uvicorn/releases)
- [Changelog](https://github.com/encode/uvicorn/blob/master/CHANGELOG.md)
- [Commits](https://github.com/encode/uvicorn/compare/0.21.1...0.22.0)

---
updated-dependencies:
- dependency-name: uvicorn
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-04-28 23:13:31 +01:00
.github Fixes DuckDuckGo and missing required dateutil dep (#1386) 2023-04-13 01:18:12 +01:00
bin Added 4 new sources, Removed 2 Sources, Added custom DNS resolver, backported to python3.9, and other misc changes (#1381) 2023-04-10 18:51:04 +01:00
README Update CONTRIBUTING.md 2020-04-02 10:06:59 +02:00
requirements chore(deps): bump uvicorn from 0.21.1 to 0.22.0 2023-04-28 23:13:31 +01:00
tests Added 4 new sources, Removed 2 Sources, Added custom DNS resolver, backported to python3.9, and other misc changes (#1381) 2023-04-10 18:51:04 +01:00
theHarvester add criminalip section to api-keys file and format tiding up 2023-04-17 01:18:55 +01:00
wordlists Merge pull request #821 from Sbajary/Adding-Dorks 2021-08-05 14:01:44 -04:00
.dockerignore fix docker file and move it to use ubuntu and add docker ignore file 2021-06-28 21:37:47 +01:00
.flake8 rename setup.cfg to be .flake8 file 2022-06-09 23:41:10 +00:00
.gitattributes Removed google-profiles and clean up. 2019-02-13 23:05:52 -06:00
.gitignore update deps and gitignore 2022-10-31 00:50:38 +00:00
.pyre_configuration add pyre config 2022-10-31 00:51:16 +00:00
api-keys.yaml Formatting 2023-04-17 15:05:57 +01:00
docker-compose.yml Multiple fixes (#1382) 2023-04-10 20:27:38 +01:00
Dockerfile Multiple fixes (#1382) 2023-04-10 20:27:38 +01:00
mypy.ini namespace_packages = True to mypy.ini 2021-08-02 16:58:58 +01:00
proxies.yaml Removed https proxies as aiohttp only officially sports http proxies. 2020-02-07 13:12:11 -05:00
pyproject.toml actually fix pyest config file 2022-06-10 00:19:46 +00:00
pytest.ini A lot of changes and fixes (#1168) 2022-08-03 23:12:59 +01:00
README.md Removed Quant. 2023-04-17 15:05:57 +01:00
requirements.txt added requirements.txt 2019-12-31 13:23:32 -05:00
restfulHarvest.py add a boat load of static typing fixes 2022-10-31 00:51:59 +00:00
setup.cfg Multiple fixes (#1382) 2023-04-10 20:27:38 +01:00
setup.py Update setup.py 2023-04-10 20:51:55 +01:00
theHarvester-logo.png Update theHarvester-logo.png 2019-09-10 23:14:45 +02:00
theHarvester-logo.webp add webp format of theHarvester logo 2023-02-05 14:57:27 +00:00
theHarvester.py Added 4 new sources, Removed 2 Sources, Added custom DNS resolver, backported to python3.9, and other misc changes (#1381) 2023-04-10 18:51:04 +01:00

theHarvester

TheHarvester CI TheHarvester Docker Image CI Rawsec's CyberSecurity Inventory

What is this?

theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
multiple public resources that include:

Passive:

  • anubis: Anubis-DB - https://github.com/jonluca/anubis

  • bevigil: CloudSEK BeVigil scans mobile application for OSINT assets and makes them available through an API - https://bevigil.com/osint-api

  • baidu: Baidu search engine - www.baidu.com

  • binaryedge: List of known subdomains from www.binaryedge.io

  • bing: Microsoft search engine - www.bing.com

  • bingapi: Microsoft search engine, through the API (Requires an API key, see below.)

  • brave: Brave search engine - https://search.brave.com/

  • bufferoverun: https://tls.bufferover.run

  • censys: Censys search engine, will use certificates searches to enumerate subdomains and gather emails (Requires an API key, see below.) - censys.io

  • certspotter: Cert Spotter monitors Certificate Transparency logs - https://sslmate.com/certspotter/

  • criminalip Specialized Cyber Threat Intelligence (CTI) search engine - https://www.criminalip.io

  • crtsh: Comodo Certificate search - https://crt.sh

  • dnsdumpster: DNSdumpster search engine - https://dnsdumpster.com

  • duckduckgo: DuckDuckGo search engine - www.duckduckgo.com

  • fullhunt: The Next-Generation Attack Surface Security Platform - https://fullhunt.io

  • github-code: GitHub code search engine (Requires a GitHub Personal Access Token, see below.) - www.github.com

  • hackertarget: Online vulnerability scanners and network intelligence to help organizations - https://hackertarget.com

  • hunter: Hunter search engine (Requires an API key, see below.) - www.hunter.io

  • hunterhow: Internet Search Engines For Security Researchers - https://hunter.how

  • intelx: Intelx search engine (Requires an API key, see below.) - www.intelx.io

  • omnisint: Project Crobat, A Centralised Searchable Open Source Project Sonar DNS Database - https://github.com/Cgboal/SonarSearch

  • otx: AlienVault Open Threat Exchange - https://otx.alienvault.com

  • pentesttools: Powerful Penetration Testing Tools, Easy to Use (Requires an API key, see below.) - https://pentest-tools.com/home

  • projecdiscovery: We actively collect and maintain internet-wide assets data, to enhance research and analyse changes around DNS for better insights (Requires an API key, see below.) - https://chaos.projectdiscovery.io

  • rapiddns: DNS query tool which make querying subdomains or sites of a same IP easy! https://rapiddns.io

  • rocketreach: Access real-time verified personal/professional emails, phone numbers, and social media links. - https://rocketreach.co

  • securityTrails: Security Trails search engine, the world's largest repository of historical DNS data
    (Requires an API key, see below.) - www.securitytrails.com

  • shodan: Shodan search engine, will search for ports and banners from discovered hosts (Requires an API key, see below.) - https://shodan.io

  • subdomainfinderc99: A subdomain finder is a tool used to find the subdomains of a given domain - https://subdomainfinder.c99.nl

  • threatminer: Data mining for threat intelligence - https://www.threatminer.org/

  • urlscan: A sandbox for the web that is a URL and website scanner - https://urlscan.io

  • vhost: Bing virtual hosts search

  • virustotal: virustotal.com domain search

  • yahoo: Yahoo search engine

  • zoomeye: China version of shodan - https://www.zoomeye.org

Active:

  • DNS brute force: dictionary brute force enumeration
  • Screenshots: Take screenshots of subdomains that were found

Modules that require an API key:

Documentation to setup API keys can be found at - https://github.com/laramies/theHarvester/wiki/Installation#api-keys

  • bevigil - Free upto 50 queries. Pricing can be found here: https://bevigil.com/pricing/osint
  • binaryedge - $10/month
  • bing
  • bufferoverun - uses the free api
  • censys - API keys are required and can be retrieved from your Censys account.
  • criminalip
  • fullhunt
  • github
  • hunter - limited to 10 on the free plan, so you will need to do -l 10 switch
  • hunterhow
  • intelx
  • pentesttools - $
  • projecdiscovery - invite only for now
  • rocketreach - $
  • securityTrails
  • shodan - $
  • zoomeye

Install and dependencies:

Comments, bugs, and requests:

Main contributors:

  • Twitter Follow Matthew Brown @NotoriousRebel1
  • Twitter Follow Jay "L1ghtn1ng" Townsend @jay_townsend1
  • Twitter Follow Lee Baird @discoverscripts

Thanks:

  • John Matherly - Shodan project
  • Ahmed Aboul Ela - subdomain names dictionaries (big and small)