E-mails, subdomains and names Harvester - OSINT
Find a file
L1ghtn1ng 5b83e45a8a Update pipx install to specify Python version
Specifying Python 3.12 for pipx installation ensures compatibility and proper functionality of the installed package. This change avoids any default Python version conflicts that might arise during the build process.
2024-10-27 01:47:55 +01:00
.github Move continue-on-error for Python 3.13 to individual steps 2024-10-16 05:51:41 +01:00
bin Update Python version requirements and clean up code 2024-10-16 03:27:09 +01:00
README Update Docker Python version , adjust Docker ignore files 2024-10-27 01:09:59 +01:00
requirements Bump ruff from 0.7.0 to 0.7.1 2024-10-24 23:02:17 +01:00
tests Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
theHarvester Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
.dockerignore Update Docker Python version , adjust Docker ignore files 2024-10-27 01:09:59 +01:00
.git-blame-ignore-revs update run formatter commit 2023-07-26 22:10:19 -04:00
.gitattributes Removed google-profiles and clean up. 2019-02-13 23:05:52 -06:00
.gitignore update deps and gitignore 2022-10-31 00:50:38 +00:00
docker-compose.yml Update Docker settings and shift to pipx for module installation 2023-12-18 16:34:06 +00:00
Dockerfile Update pipx install to specify Python version 2024-10-27 01:47:55 +01:00
pyproject.toml Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
README.md Update README.md 2024-10-26 17:56:31 +01:00
requirements.txt added requirements.txt 2019-12-31 13:23:32 -05:00
restfulHarvest.py reformat with ruff 2024-08-07 19:28:52 +01:00
theHarvester-logo.png Update theHarvester-logo.png 2019-09-10 23:14:45 +02:00
theHarvester-logo.webp add webp format of theHarvester logo 2023-02-05 14:57:27 +00:00
theHarvester.py fix typo 2024-10-26 17:54:56 +01:00

theHarvester

TheHarvester CI TheHarvester Docker Image CI Rawsec's CyberSecurity Inventory

What is this?

theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
multiple public resources that include:

Passive modules:

Active modules:

  • DNS brute force: dictionary brute force enumeration
  • Screenshots: Take screenshots of subdomains that were found

Modules that require an API key:

Documentation to setup API keys can be found at - https://github.com/laramies/theHarvester/wiki/Installation#api-keys

  • bevigil - Free upto 50 queries. Pricing can be found here: https://bevigil.com/pricing/osint
  • binaryedge - $10/month
  • bing
  • bufferoverun - uses the free API
  • censys - API keys are required and can be retrieved from your Censys account.
  • criminalip
  • fullhunt
  • github
  • hunter - limited to 10 on the free plan, so you will need to do -l 10 switch
  • hunterhow
  • intelx
  • netlas - $
  • onyphe -$
  • pentestTools - $
  • projecDiscovery - invite only for now
  • rocketreach - $
  • securityTrails
  • shodan - $
  • tomba - Free up to 50 search.
  • zoomeye

Install and dependencies:

Comments, bugs, and requests:

Main contributors:

  • Twitter Follow Matthew Brown @NotoriousRebel1
  • Twitter Follow Jay "L1ghtn1ng" Townsend @jay_townsend1
  • Twitter Follow Lee Baird @discoverscripts

Thanks:

  • John Matherly - Shodan project
  • Ahmed Aboul Ela - subdomain names dictionaries (big and small)