E-mails, subdomains and names Harvester - OSINT
Find a file
J.Townsend 73c1b485a6
Merge pull request #519 from laramies/dependabot/pip/requirements/master/texttable-1.6.3
Bump texttable from 1.6.2 to 1.6.3 in /requirements
2020-09-07 23:38:20 +01:00
.github remove dogpile module as there is a capcha and update readme and tidy up on qwant 2020-08-23 20:29:53 +01:00
bin Fix #401 2020-08-18 00:08:07 +01:00
README Update CONTRIBUTING.md 2020-04-02 10:06:59 +02:00
requirements Bump texttable from 1.6.2 to 1.6.3 in /requirements 2020-09-07 04:02:03 +00:00
tests add static typing and tests (qwant search engine discovery) 2020-08-17 13:31:15 +02:00
theHarvester remove suip from sources 2020-08-23 20:35:47 +01:00
wordlists
.gitattributes
.gitignore fix readme and add new gitignore entry 2020-08-18 00:18:58 +01:00
.lgtm.yml Make sure we set lgtm.yml to use python3 2019-09-22 22:24:22 +01:00
.travis.yml add static typing and tests (qwant search engine discovery) 2020-08-17 13:31:15 +02:00
api-keys.yaml Remove the shodan key as it has been revocked 2020-05-26 21:49:17 +01:00
Dockerfile Update readme and deps and fix docker build 2020-03-22 17:36:41 +00:00
mypy.ini Update mypy settings to use the new features of the 0.730 release 2019-09-26 19:36:01 +01:00
Pipfile Bump pytest from 6.0.0 to 6.0.1 2020-07-31 11:16:46 +00:00
Pipfile.lock Bump more-itertools from 8.4.0 to 8.5.0 2020-09-05 16:45:49 +00:00
proxies.yaml Removed https proxies as aiohttp only officially sports http proxies. 2020-02-07 13:12:11 -05:00
README.md remove suip 2020-08-23 20:32:41 +01:00
requirements.txt added requirements.txt 2019-12-31 13:23:32 -05:00
setup.cfg remove commented out flake8 param 2019-09-26 21:48:40 +01:00
setup.py Fix #401 2020-08-18 00:08:07 +01:00
theHarvester-logo.png Update theHarvester-logo.png 2019-09-10 23:14:45 +02:00
theHarvester.py Fix #401 2020-08-18 00:08:07 +01:00

theHarvester

TheHarvester CI TheHarvester Docker Image CI Language grade: Python Rawsec's CyberSecurity Inventory

What is this?

theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a
penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a
company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using
multiple public data sources that include:

Passive:

  • baidu: Baidu search engine - www.baidu.com

  • bing: Microsoft search engine - www.bing.com

  • bingapi: Microsoft search engine, through the API (Requires an API key, see below.)

  • bufferoverun: Uses data from Rapid7's Project Sonar - www.rapid7.com/research/project-sonar/

  • certspotter: Cert Spotter monitors Certificate Transparency logs - https://sslmate.com/certspotter/

  • crtsh: Comodo Certificate search - https://crt.sh

  • dnsdumpster: DNSdumpster search engine - https://dnsdumpster.com

  • duckduckgo: DuckDuckGo search engine - www.duckduckgo.com

  • exalead: a Meta search engine - www.exalead.com/search

  • github-code: GitHub code search engine (Requires a GitHub Personal Access Token, see below.) - www.github.com

  • google: Google search engine (Optional Google dorking.) - www.google.com

  • hackertarget: Online vulnerability scanners and network intelligence to help organizations - https://hackertarget.com

  • hunter: Hunter search engine (Requires an API key, see below.) - www.hunter.io

  • intelx: Intelx search engine (Requires an API key, see below.) - www.intelx.io

  • linkedin: Google search engine, specific search for LinkedIn users - www.linkedin.com

  • linkedin_links:

  • netcraft: Internet Security and Data Mining - www.netcraft.com

  • otx: AlienVault Open Threat Exchange - https://otx.alienvault.com

  • pentesttools: Powerful Penetration Testing Tools, Easy to Use (Needs an API key and is not free for API access) - https://pentest-tools.com/home

  • qwant: Qwant search engine - www.qwant.com

  • rapiddns: DNS query tool which make querying subdomains or sites of a same IP easy! https://rapiddns.io

  • securityTrails: Security Trails search engine, the world's largest repository of historical DNS data
    (Requires an API key, see below.) - www.securitytrails.com

  • shodan: Shodan search engine, will search for ports and banners from discovered hosts - www.shodanhq.com

  • spyse: Web research tools for professionals (Requires an API key.) - https://spyse.com

  • sublist3r: Fast subdomains enumeration tool for penetration testers - https://api.sublist3r.com/search.php?domain=example.com

  • threatcrowd: Open source threat intelligence - www.threatcrowd.org

  • threatminer: Data mining for threat intelligence - https://www.threatminer.org/

  • trello: Search trello boards (Uses Google search.)

  • twitter: Twitter accounts related to a specific domain (Uses Google search.)

  • urlscan: A sandbox for the web that is a URL and website scanner - https://urlscan.io

  • vhost: Bing virtual hosts search

  • virustotal: virustotal.com domain search

  • yahoo: Yahoo search engine

Active:

  • DNS brute force: dictionary brute force enumeration
  • Screenshots: Take screenshots of subdomains that were found

Modules that require an API key:

Documentation to setup API keys can be found at - https://github.com/laramies/theHarvester/wiki/Installation#api-keys

  • bing
  • github
  • hunter - limited to 10 on the free plan so you will ned to do -l 10 switch
  • intelx
  • pentesttools
  • securityTrails
  • shodan
  • spyse - need to have a paid account be able to use the api now

Install and dependencies:

Comments, bugs and requests:

Main contributors:

  • Twitter Follow Matthew Brown @NotoriousRebel1
  • Twitter Follow Jay "L1ghtn1ng" Townsend @jay_townsend1
  • Twitter Follow Lee Baird @discoverscripts
  • LinkedIn Janos Zold

Thanks:

  • John Matherly - Shodan project
  • Ahmed Aboul Ela - subdomain names dictionaries (big and small)