.github | ||
tests | ||
theHarvester | ||
wordlists | ||
.gitattributes | ||
.gitignore | ||
.lgtm.yml | ||
.travis.yml | ||
api-keys.yaml | ||
CONTRIBUTING.md | ||
COPYING | ||
Dockerfile | ||
LICENSES | ||
mypy.ini | ||
Pipfile | ||
Pipfile.lock | ||
README.md | ||
requirements.txt | ||
setup.cfg | ||
setup.py | ||
theHarvester-logo.png | ||
theHarvester.py |
What is this?
theHarvester is a very simple, yet effective tool designed to be used in the early
stages of a penetration test. Use it for open source intelligence gathering and
helping to determine a company's external threat landscape on the internet. The
tool gathers emails, names, subdomains, IPs, and URLs using multiple public data
sources that include:
Passive:
-
baidu: Baidu search engine - www.baidu.com
-
bing: Microsoft search engine - www.bing.com
-
bingapi: Microsoft search engine, through the API (Requires API key, see below.)
-
CertSporter: Cert Spotter monitors Certificate Transparency logs - https://sslmate.com/certspotter/
-
crtsh: Comodo Certificate search - www.crt.sh
-
dnsdumpster: DNSdumpster search engine - dnsdumpster.com
-
dogpile: Dogpile search engine - www.dogpile.com
-
duckduckgo: DuckDuckGo search engine - www.duckduckgo.com
-
Exalead: a Meta search engine - https://www.exalead.com/search
-
github-code: Github code search engine (Requires Github Personal Access Token, see below.) - www.github.com
-
google: Google search engine (Optional Google dorking.) - www.google.com
-
hunter: Hunter search engine (Requires API key, see below.) - www.hunter.io
-
intelx: Intelx search engine (Requires API key, see below.) - www.intelx.io
-
linkedin: Google search engine, specific search for Linkedin users - www.linkedin.com
-
netcraft: Netcraft Data Mining - www.netcraft.com
-
otx: AlienVault Open Threat Exchange - https://otx.alienvault.com
-
securityTrails: Security Trails search engine, the world's largest repository
of historical DNS data (Requires API key, see below.) - www.securitytrails.com -
shodan: Shodan search engine, will search for ports and banners from discovered
hosts - www.shodanhq.com -
Spyse: Web research tools for professionals(Requires an API key) - https://spyse.com/
-
Suip: Web research tools(This module can take 10 mins+ to run but it is worth the wait) - https://suip.biz/
-
threatcrowd: Open source threat intelligence - www.threatcrowd.org
-
trello: Search trello boards (Uses Google search.)
-
twitter: Twitter accounts related to a specific domain (Uses Google search.)
-
vhost: Bing virtual hosts search
-
virustotal: virustotal.com domain search
-
yahoo: Yahoo search engine
Active:
- DNS brute force: dictionary brute force enumeration
Modules that require an API key:
Add your keys to api-keys.yaml
- bingapi
- github
- hunter
- intelx
- securityTrails
- shodan
- spyse
Dependencies:
- Python 3.7+
- python3 -m pip install pipenv
- pipenv install
Comments, bugs, or requests?
- Christian Martorella @laramies cmartorella@edge-security.com
- Matthew Brown @NotoriousRebel1
- Jay "L1ghtn1ng" Townsend @jay_townsend1
Main contributors:
- Matthew Brown @NotoriousRebel1
- Jay "L1ghtn1ng" Townsend @jay_townsend1
- Lee Baird @discoverscripts
- Janos Zold
Thanks:
- John Matherly - Shodan project
- Ahmed Aboul Ela - subdomain names dictionaries (big and small)