-
Notifications
You must be signed in to change notification settings - Fork 0
/
recon.cheat
50 lines (35 loc) · 1.42 KB
/
recon.cheat
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
% recon
# dnsrecon
dnsrecon.py -d <domain>
# Brute force dns hostname par reverse looking des ips d'un domaine
dnsrecon -r <RANGE> -n <DNS> -d PleaseSubScribe
# Find subdomains
findomain -t <domain>
# Find subdomains
sublist3r -d <domain>
# Find subdomains
sufinder -d <domain> -o <output>
# cobrat project subdomains
curl "https://sonar.omnisint.io/subdomains/<domain>" -sk | jq -r ".[]"
# Find subdomains from list, recursive
sufinder -dL <domains> --recursive -o <output>
# subzy subdomains takeover
subzy --targets <file> --concurrency 20 --hide fails
# subjack subdomains takeover
subjack -w <sites> -t 100 -timeout 30 -o <output> -ssl
# Bruteforce domains with amass
amass enum -brute -d <domain> -o <domain>.txt -p 80,443,8080,8443,8000
# Aquatone
cat <domains_list_file> | httprobe -c 20 | aquatone -chrome-path /bin/chromium
# Aquatone + dnsgen
dnsgen -w <wordlist> <domains_list_file> | httprobe -c 20 | aquatone -chrome-path /bin/chromium
# httprobemore
; the x-large <list> from aquatone
cat <list> | httprobe -p http:8000 -p https:9443 -p http:8080 -p https:8443 -c 50 -t 1000
# http verb tampering
echo -n "<url>: "; for i in GET POST HEAD PUT DELETE CONNECT OPTIONS TRACE PATCH ASDF; \
do echo "echo -n \"$i-$(curl -k -s -X $i $1 -o /dev/null -w '%{http_code}') \""; done \
| parallel -j 10 ; echo
# linkfinder wrapper
python3 linkfinder.py -i <url> -o cli \
| grep -v http | grep -v // | sed 's/^\.\//\//' | sed 's/^\///'