@@ -69,10 +69,7 @@ if [ -z "${domain}" ]; then
6969fi
7070
7171
72-
73- # 1) first step of recon
7472recon (){
75-
7673 # public dataset search in project sonar (A rapid API for the Project Sonar dataset)
7774 echo -e " ${green} 1.Listing subdomains using crobat...${reset} "
7875 crobat -s $domain > ./$domain /$foldername /$domain .txt
@@ -101,27 +98,30 @@ recon(){
10198# amass3=`amass track -d $domain`
10299}
103100
101+ searchcrtsh (){
102+ echo " ${green} Checking http://crt.sh ${reset} "
103+ ~ /tools/massdns/scripts/ct.py $domain 2> /dev/null > ./$domain /$foldername /tmp.txt
104+ [ -s ./$domain /$foldername /tmp.txt ] && cat ./$domain /$foldername /tmp.txt | ~ /tools/massdns/bin/massdns -r ~ /tools/massdns/lists/resolvers.txt -t A -q -o S -w ./$domain /$foldername /crtsh.txt
105+ cat ./$domain /$foldername /$domain .txt | ~ /tools/massdns/bin/massdns -r ~ /tools/massdns/lists/resolvers.txt -t A -q -o S -w ./$domain /$foldername /domaintemp.txt
106+ }
107+
104108
105109permutatesubdomains (){
106- cat ./$domain /$foldername /$domain .txt | dnsgen - | tee ./$domain /$foldername /dnsgen.txt
110+ cat ./$domain /$foldername /$domain .txt | dnsgen - | sort -u | tee ./$domain /$foldername /dnsgen.txt
107111 mv ./$domain /$foldername /dnsgen.txt ./$domain /$foldername /$domain .txt
108112}
109113
110114
111115dnsprobing (){
112116 echo " ${green} Started dnsprobing with shuffledns...${reset} "
113- cat ./$domain /$foldername /$domain .txt | shuffledns -d $domain -silent -r ~ /tools/massdns/lists/resolvers.txt -o ./$domain /$foldername /mass.txt
117+ cat ./$domain /$foldername /$domain .txt | sort -u | shuffledns -d $domain -silent -r ~ /tools/massdns/lists/resolvers.txt -o ./$domain /$foldername /mass.txt
114118 # echo -e "4.1.Brute force all subdomain to find subdomain using shuffledns..."
115119 # shuffledns -d $domain -silent -list ./$domain/$foldername/$domain.txt -r ~/tools/massdns/lists/resolvers.txt -o ./$domain/$foldername/mass.txt
116120}
117121
118122
119-
120-
121123subdomain_takeover (){
122-
123124 echo " ${green} Started dns records check...${reset} "
124-
125125 cat ./$domain /$foldername /mass.txt >> ./$domain /$foldername /temp.txt
126126 cat ./$domain /$foldername /domaintemp.txt >> ./$domain /$foldername /temp.txt
127127 cat ./$domain /$foldername /crtsh.txt >> ./$domain /$foldername /temp.txt
@@ -150,20 +150,9 @@ subdomain_takeover(){
150150 echo " ${x% ?} " >> ./$domain /$foldername /alldomains.txt
151151 done
152152 sleep 1
153-
154- }
155-
156-
157-
158- searchcrtsh (){
159- echo " ${green} Checking http://crt.sh ${reset} "
160- ~ /tools/massdns/scripts/ct.py $domain 2> /dev/null > ./$domain /$foldername /tmp.txt
161- [ -s ./$domain /$foldername /tmp.txt ] && cat ./$domain /$foldername /tmp.txt | ~ /tools/massdns/bin/massdns -r ~ /tools/massdns/lists/resolvers.txt -t A -q -o S -w ./$domain /$foldername /crtsh.txt
162- cat ./$domain /$foldername /$domain .txt | ~ /tools/massdns/bin/massdns -r ~ /tools/massdns/lists/resolvers.txt -t A -q -o S -w ./$domain /$foldername /domaintemp.txt
163153}
164154
165155
166-
167156checkhttprobe (){
168157 echo " Probing for live hosts with httprobe..."
169158 cat ./$domain /$foldername /alldomains.txt | sort -u | httprobe -c 50 -t 3000 >> ./$domain /$foldername /responsive.txt
@@ -201,7 +190,6 @@ directory_bruteforce(){
201190}
202191
203192
204-
205193vulnscanner (){
206194 echo -e " ${green} Starting vuln scanner with nuclei...${reset} "
207195 cat ./$domain /$foldername /urllist.txt | nuclei -tags exposure,unauth,cache -o ./$domain /$foldername /nuclei.txt -silent; notify -bulk -data ./$domain /$foldername /nuclei.txt -silent
@@ -212,29 +200,21 @@ vulnscanner(){
212200 cat ./$domain /$foldername /xss_raw_result.txt | cut -d ' ' -f2 | tee ./$domain /$foldername /xss_result.txt; notify -bulk -data ./$domain /$foldername /xss_result.txt -silent
213201 # cat test.txt | gf xss | sed ‘s/=.*/=/’ | sed ‘s/URL: //’ | tee testxss.txt ; dalfox file testxss.txt -b yours-xss-hunter-domain(e.g yours.xss.ht)
214202
215-
216-
217203 # echo -e "${green}find sql injection with wayback ...${reset}"
218204 # python3 paramspider.py -d $domain -s TRUE -e woff,ttf,eot,css,js,png,svg,jpg | deduplicate --sort | httpx -silent | sqlmap
219205
220-
221206 # echo -e "${green}find open redirect vulnerability ...${reset}"
222207 # cat ./$domain/$foldername/waybackurls.txt | gf redirect | qsreplace -a | httpx -silent | while read domain; do python3 oralyzer.py -u $domain; done
223208
224-
225209 # echo -e "${green}find CORS vulnerability ...${reset}"
226210 # echo https://google.com | hakrawler -u | httpx -silent | CorsMe
227211
228-
229212 # echo -e "${green}find Prototype Pollution vulnerability ...${reset}"
230213 # echo https://google.com | hakrawler -u | httpx -silent | ppmap
231214
232-
233-
234215 # echo -e "${green}find dom xss with parameter pollution vulnerability ...${reset}"
235216 # cat ./$domain/$foldername/waybackurls.txt | httpx -silent | ppmap
236217
237-
238218 echo -e " ${green} Starting up listen server...${reset} "
239219 interactsh-client -v & > ./$domain /$foldername /listen_server.txt & SERVER_PID=$!
240220 sleep 5 # to properly start listen server
@@ -249,8 +229,6 @@ vulnscanner(){
249229
250230 # kill listen server
251231 kill_listen_server
252-
253-
254232}
255233
256234
@@ -379,8 +357,6 @@ logo(){
379357}
380358
381359
382-
383-
384360cleantemp (){
385361
386362 rm ./$domain /$foldername /temp.txt
0 commit comments