E-mails, subdomains and names Harvester - OSINT
Find a file
L1ghtn1ng edfdf5fa74 Update Docker Python version , adjust Docker ignore files
Upgraded Docker image to Python 3.12 and changed code quality tool references in CONTRIBUTING.md from lgtm to ruff. Also adjusted .dockerignore to include new files and remove outdated config files.
2024-10-27 01:09:59 +01:00
.github Move continue-on-error for Python 3.13 to individual steps 2024-10-16 05:51:41 +01:00
bin Update Python version requirements and clean up code 2024-10-16 03:27:09 +01:00
README Update Docker Python version , adjust Docker ignore files 2024-10-27 01:09:59 +01:00
requirements Bump ruff from 0.7.0 to 0.7.1 2024-10-24 23:02:17 +01:00
tests Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
theHarvester Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
.dockerignore Update Docker Python version , adjust Docker ignore files 2024-10-27 01:09:59 +01:00
.git-blame-ignore-revs update run formatter commit 2023-07-26 22:10:19 -04:00
.gitattributes
.gitignore update deps and gitignore 2022-10-31 00:50:38 +00:00
docker-compose.yml Update Docker settings and shift to pipx for module installation 2023-12-18 16:34:06 +00:00
Dockerfile Update Docker Python version , adjust Docker ignore files 2024-10-27 01:09:59 +01:00
pyproject.toml Add async pagination helper and update pytest settings 2024-10-27 01:02:05 +01:00
README.md Update README.md 2024-10-26 17:56:31 +01:00
requirements.txt
restfulHarvest.py reformat with ruff 2024-08-07 19:28:52 +01:00
theHarvester-logo.png
theHarvester-logo.webp add webp format of theHarvester logo 2023-02-05 14:57:27 +00:00
theHarvester.py fix typo 2024-10-26 17:54:56 +01:00

theHarvester

TheHarvester CI TheHarvester Docker Image CI Rawsec's CyberSecurity Inventory

What is this?

theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
multiple public resources that include:

Passive modules:

Active modules:

  • DNS brute force: dictionary brute force enumeration
  • Screenshots: Take screenshots of subdomains that were found

Modules that require an API key:

Documentation to setup API keys can be found at - https://github.com/laramies/theHarvester/wiki/Installation#api-keys

  • bevigil - Free upto 50 queries. Pricing can be found here: https://bevigil.com/pricing/osint
  • binaryedge - $10/month
  • bing
  • bufferoverun - uses the free API
  • censys - API keys are required and can be retrieved from your Censys account.
  • criminalip
  • fullhunt
  • github
  • hunter - limited to 10 on the free plan, so you will need to do -l 10 switch
  • hunterhow
  • intelx
  • netlas - $
  • onyphe -$
  • pentestTools - $
  • projecDiscovery - invite only for now
  • rocketreach - $
  • securityTrails
  • shodan - $
  • tomba - Free up to 50 search.
  • zoomeye

Install and dependencies:

Comments, bugs, and requests:

Main contributors:

  • Twitter Follow Matthew Brown @NotoriousRebel1
  • Twitter Follow Jay "L1ghtn1ng" Townsend @jay_townsend1
  • Twitter Follow Lee Baird @discoverscripts

Thanks:

  • John Matherly - Shodan project
  • Ahmed Aboul Ela - subdomain names dictionaries (big and small)