theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
multiple public resources that include:
-
anubis: Anubis-DB - https://github.com/jonluca/anubis
-
bevigil: CloudSEK BeVigil scans mobile application for OSINT assets and makes them available through an API - https://bevigil.com/osint-api
-
baidu: Baidu search engine - www.baidu.com
-
binaryedge: List of known subdomains from www.binaryedge.io
-
bing: Microsoft search engine - www.bing.com
-
bingapi: Microsoft search engine, through the API (Requires an API key, see below.)
-
bufferoverun: https://tls.bufferover.run
-
censys: Censys search engine, will use certificates searches to enumerate subdomains and gather emails (Requires an API key, see below.) - censys.io
-
certspotter: Cert Spotter monitors Certificate Transparency logs - https://sslmate.com/certspotter/
-
crtsh: Comodo Certificate search - https://crt.sh
-
dnsdumpster: DNSdumpster search engine - https://dnsdumpster.com
-
duckduckgo: DuckDuckGo search engine - www.duckduckgo.com
-
fullhunt: The Next-Generation Attack Surface Security Platform - https://fullhunt.io
-
github-code: GitHub code search engine (Requires a GitHub Personal Access Token, see below.) - www.github.com
-
hackertarget: Online vulnerability scanners and network intelligence to help organizations - https://hackertarget.com
-
hunter: Hunter search engine (Requires an API key, see below.) - www.hunter.io
-
intelx: Intelx search engine (Requires an API key, see below.) - www.intelx.io
-
omnisint: Project Crobat, A Centralised Searchable Open Source Project Sonar DNS Database - https://github.com/Cgboal/SonarSearch
-
otx: AlienVault Open Threat Exchange - https://otx.alienvault.com
-
pentesttools: Powerful Penetration Testing Tools, Easy to Use (Requires an API key, see below.) - https://pentest-tools.com/home
-
projecdiscovery: We actively collect and maintain internet-wide assets data, to enhance research and analyse changes around DNS for better insights (Requires an API key, see below.) - https://chaos.projectdiscovery.io
-
qwant: Qwant search engine - www.qwant.com
-
rapiddns: DNS query tool which make querying subdomains or sites of a same IP easy! https://rapiddns.io
-
rocketreach: Access real-time verified personal/professional emails, phone numbers, and social media links. - https://rocketreach.co
-
securityTrails: Security Trails search engine, the world's largest repository of historical DNS data
(Requires an API key, see below.) - www.securitytrails.com -
shodan: Shodan search engine, will search for ports and banners from discovered hosts (Requires an API key, see below.) - www.shodanhq.com
-
sublist3r: Fast subdomains enumeration tool for penetration testers - https://api.sublist3r.com/search.php?domain=example.com
-
threatcrowd: Open source threat intelligence - www.threatcrowd.org
-
threatminer: Data mining for threat intelligence - https://www.threatminer.org/
-
urlscan: A sandbox for the web that is a URL and website scanner - https://urlscan.io
-
vhost: Bing virtual hosts search
-
virustotal: virustotal.com domain search
-
yahoo: Yahoo search engine
-
zoomeye: China version of shodan - https://www.zoomeye.org
- DNS brute force: dictionary brute force enumeration
- Screenshots: Take screenshots of subdomains that were found
Documentation to setup API keys can be found at - https://github.com/laramies/theHarvester/wiki/Installation#api-keys
- bevigil - Free upto 50 queries. Pricing can be found here: https://bevigil.com/pricing/osint
- binaryedge - $10/month
- bing
- bufferoverun - uses the free api
- censys - API keys are required and can be retrieved from your Censys account.
- fullhunt
- github
- hunter - limited to 10 on the free plan, so you will need to do -l 10 switch
- intelx
- pentesttools - $
- projecdiscovery - invite only for now
- rocketreach - $
- securityTrails
- shodan - $
- zoomeye
- Christian Martorella @laramies [email protected]
- Matthew Brown @NotoriousRebel1
- Jay "L1ghtn1ng" Townsend @jay_townsend1
- John Matherly - Shodan project
- Ahmed Aboul Ela - subdomain names dictionaries (big and small)