ExplorerPy is a recon-toolkit for information-gathering. It is designed to gather information about a domain by performing various tasks such as subdomain enumeration, directory brute-forcing, and port scanning.
git clone https://github.com/M3hank/ExplorerPy.git
cd ExplorerPy
pip3 install -r requirements.txt
ExplorerPy has the following requirements:
usage: ExplorerPy [-h] [-d DOMAIN] [-t THREADCOUNT] [-w WORDLIST] [-o OUTPUT_FILE]
[-time TIME]
[-se] [-osint] [-dir] [-ps] [-p PORTRANGE]
optional arguments:
-h, --help show this help message and exit
-d DOMAIN, DOMAIN
Domain name to scan
-t THREADCOUNT
Number of threads to use for scanning (default: 20)
-w WORDLIST
Wordlist to use for brute-forcing
-o OUTPUT_FILE
Output file to write results to (default: None)
-time TIME
Timeout for requests in seconds (default: 15)
Subdomain-Enumeration Arguments:
-se Enable subdomain enumeration module
-osint Use OSINT (Open Source Intelligence) methods instead of
brute-forcing for subdomain enumeration
Directory-Enumeration Arguments:
-dir Enable directory brute-forcing module
-fc, --filter_code FILTER_CODE
Status codes to filter out (comma separated)
-fs, --filter_size FILTER_SIZE
Filter out directories with a response size equal to this value
Port-Scanner Arguments:
-ps Enable port scanning module
-p Range of ports to scan (default: 1024)
To perform subdomain enumeration using brute-forcing:
python3 ExplorerPy -d example.com -se -w wordlist.txt
To perform subdomain enumeration using OSINT methods:
python3 ExplorerPy -d example.com -se -osint
To perform directory brute-forcing:
python3 ExplorerPy -d example.com -dir -w wordlist.txt
To perform port scanning:
python3 ExplorerPy -d example.com -ps
To perform port scanning with a specific range of ports:
python3 ExplorerPy -d example.com -ps -p 1000
Disclaimer This script is intended for educational and testing purposes only. It is not intended to be used for malicious purposes, and the authors of this script are not responsible for any misuse or damage caused by this script. Use of this script is at your own risk.
GNU General Public License v3.0
Contributions are always welcome!