gwen001 / offsectools_www

A vast collection of security tools and resources curated by the community.
https://offsec.tools
179 stars 21 forks source link

[addtool] ReconBulk #1102

Closed piyush-security closed 1 year ago

piyush-security commented 1 year ago

[homepage] https://github.com/TaurusOmar/reconbulk [/homepage]

[tags] recon, enumeration, subdomains, domains, bugbounty [/tags]

[short_descr] Automated Subdomain Enumeration and Scanning Tool [/short_descr]

[long_descr]

ReconBulk

Automated Subdomain Enumeration and Scanning Tool

______                    ______       _ _
| ___ \                   | ___ \     | | |
| |_/ /___  ___ ___  _ __ | |_/ /_   _| | | __
|    // _ \/ __/ _ \| '_ \| ___ \ | | | | |/ /
| |\ \  __/ (_| (_) | | | | |_/ / |_| | |   <
\_| \_\___|\___\___/|_| |_\____/ \__,_|_|_|\_\

                    V.1.0
                    Taurus Omar

Scanning crt.sh...

Target ==> projectdiscovery.io

Searching in the CertSpotter API... 🔍
Searching in the Crtsh database API... 🔍
Searching in the Threatcrowd API... 🔍
Searching in the AnubisDB API... 🔍
Searching in the Urlscan.io API... 🔍
Searching in the Threatminer API... 🔍
Searching in the Sublist3r API... 🔍
Searching in the Archive.org API... 🔍

This script automates the process of subdomain enumeration and scanning using several popular open-source tools, combining their results and providing detailed output. The primary purpose of this tool is to simplify and streamline the process of discovering subdomains and their related information for a given domain.

Features

File Structure

recon/
└── results/
└── example.com-<timestamp>/
├── amass_example.com/
│   ├── config.ini
│   ├── db/
│   ├── named/
│   └── notes.md
├── amass_example.com.txt
├── assetfinder_example.com.txt
├── findomain_example.com.txt
├── httpx_example.com.txt
├── naabu_example.com.txt
├── nuclei_example.com.txt
├── subdomains/
│   ├── amass_example.com.txt
│   ├── assetfinder_example.com.txt
│   ├── crt.sh.txt
│   ├── findomain_example.com.txt
│   ├── subfinder_example.com.txt
│   └── unique_subdomains.txt
└── subfinder_example.com.txt

image

Installation

  1. If you have Go installed and configured (i.e. with $GOPATH/bin in your $PATH):
go install github.com/TaurusOmar/reconbulk@latest
  1. Install all required tools:

Make sure all these tools are in your system's PATH.

  1. Prepare a list of DNS resolvers. You can find a sample list here.

Usage

reconbulk <domain> <resolvers_list>

The script will create a directory named ~/recon/results/<domain>-<timestamp> containing the output files from each tool.

Output

The output directory will contain the following files:

[/long_descr]

[image] image

[/image]

gwen001 commented 1 year ago

Issue correctly handled, tool is waiting for human validation.

gwen001 commented 1 year ago

Tool has been refused by the team, feel free to get in touch if you have any question.

Thank you!

gwen001 commented 1 year ago

Tool has been refused by the team, feel free to get in touch if you have any question.

Thank you!