前言

https://github.com/ismailtasdelen/hackertarget

代码

主要通过这家公司提供的API查询相关数据实现的功能,API看起来可以用很久。

  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. import requests
  4. hackertarget_logo = """
  5. _ _ _ _
  6. | |_ __ _ __ | |__ ___ _ _ | |_ __ _ _ _ __ _ ___ | |_
  7. | ' \ / _` |/ _|| / // -_)| '_|| _|/ _` || '_|/ _` |/ -_)| _|
  8. |_||_|\__,_|\__||_\_\\___||_| \__|\__,_||_| \__, |\___| \__|
  9. |___/
  10. Ismail Tasdelen
  11. | github.com/ismailtasdelen | linkedin.com/in/ismailtasdelen |
  12. """
  13. menu = """
  14. [1] Traceroute
  15. [2] Ping Test
  16. [3] DNS Lookup
  17. [4] Reverse DNS
  18. [5] Find DNS Host
  19. [6] Find Shared DNS
  20. [7] Zone Transfer
  21. [8] Whois Lookup
  22. [9] IP Location Lookup
  23. [10] Reverse IP Lookup
  24. [11] TCP Port Scan
  25. [12] Subnet Lookup
  26. [13] HTTP Header Check
  27. [14] Extract Page Links
  28. [15] Exit
  29. """
  30. print hackertarget_logo
  31. print menu
  32. def run():
  33. try:
  34. choice = input("Which option number : ")
  35. if choice == 1:
  36. print("\n")
  37. print("[+] Traceroute script running..")
  38. target = raw_input("[+] Target : ")
  39. print("\n")
  40. url = "https://api.hackertarget.com/mtr/?q=" + target
  41. request = requests.get(url)
  42. txt = request.text
  43. print(txt)
  44. elif choice == 2:
  45. print("\n")
  46. print("[+] Ping Test script running..")
  47. target = raw_input("[+] Target : ")
  48. print("\n")
  49. url = "https://api.hackertarget.com/nping/?q=" + target
  50. request = requests.get(url)
  51. txt = request.text
  52. print(txt)
  53. elif choice == 3:
  54. print("\n")
  55. print("[+] DNS Lookup script running..")
  56. target = raw_input("[+] Target : ")
  57. print("\n")
  58. url = "https://api.hackertarget.com/dnslookup/?q=" + target
  59. request = requests.get(url)
  60. txt = request.text
  61. print(txt)
  62. elif choice == 4:
  63. print("\n")
  64. print("[+] Reverse DNS script running..")
  65. target = raw_input("[+] Target : ")
  66. print("\n")
  67. url = "https://api.hackertarget.com/reversedns/?q=" + target
  68. request = requests.get(url)
  69. txt = request.text
  70. print(txt)
  71. elif choice == 5:
  72. print("\n")
  73. print("[+] Find DNS Host script running..")
  74. target = raw_input("[+] Target : ")
  75. print("\n")
  76. url = "https://api.hackertarget.com/hostsearch/?q=" + target
  77. request = requests.get(url)
  78. txt = request.text
  79. print(txt)
  80. elif choice == 6:
  81. print("\n")
  82. print("[+] Find Shared DNS script running..")
  83. target = raw_input("[+] Target : ")
  84. print("\n")
  85. url = "https://api.hackertarget.com/findshareddns/?q=" + target
  86. request = requests.get(url)
  87. txt = request.text
  88. print(txt)
  89. elif choice == 7:
  90. print("\n")
  91. print("[+] Zone Transfer script running..")
  92. target = raw_input("[+] Target : ")
  93. print("\n")
  94. url = "https://api.hackertarget.com/zonetransfer/?q=" + target
  95. request = requests.get(url)
  96. txt = request.text
  97. print(txt)
  98. elif choice == 8:
  99. print("\n")
  100. print("[+] Whois Lookup script running..")
  101. target = raw_input("[+] Target : ")
  102. print("\n")
  103. url = "https://api.hackertarget.com/whois/?q=" + target
  104. request = requests.get(url)
  105. txt = request.text
  106. print(txt)
  107. elif choice == 9:
  108. print("\n")
  109. print("[+] IP Location Lookup script running..")
  110. target = raw_input("[+] Target : ")
  111. print("\n")
  112. url = "https://api.hackertarget.com/geoip/?q=" + target
  113. request = requests.get(url)
  114. txt = request.text
  115. print(txt)
  116. elif choice == 10:
  117. print("\n")
  118. print("[+] Reverse IP Lookup script running..")
  119. target = raw_input("[+] Target : ")
  120. print("\n")
  121. url = "https://api.hackertarget.com/reverseiplookup/?q=" + target
  122. request = requests.get(url)
  123. txt = request.text
  124. print(txt)
  125. elif choice == 11:
  126. print("\n")
  127. print("[+] TCP Port Scan script running..")
  128. target = raw_input("[+] Target : ")
  129. print("\n")
  130. url = "https://api.hackertarget.com/nmap/?q=" + target
  131. request = requests.get(url)
  132. txt = request.text
  133. print(txt)
  134. elif choice == 12:
  135. print("\n")
  136. print("[+] Subnet Lookup script running..")
  137. target = raw_input("[+] Target : ")
  138. print("\n")
  139. url = "https://api.hackertarget.com/subnetcalc/?q=" + target
  140. request = requests.get(url)
  141. txt = request.text
  142. print(txt)
  143. elif choice == 13:
  144. print("\n")
  145. print("[+] HTTP Header Check script running..")
  146. target = raw_input("[+] Target : ")
  147. print("\n")
  148. url = "https://api.hackertarget.com/httpheaders/?q=" + target
  149. request = requests.get(url)
  150. txt = request.text
  151. print(txt)
  152. elif choice == 14:
  153. print("\n")
  154. print("[+] Extract Page Links script running..")
  155. target = raw_input("[+] Target : ")
  156. print("\n")
  157. url = "https://api.hackertarget.com/pagelinks/?q=" + target
  158. request = requests.get(url)
  159. txt = request.text
  160. print(txt)
  161. elif choice == 15:
  162. exit()
  163. except KeyboardInterrupt:
  164. print("\nAborted!")
  165. quit()
  166. except:
  167. print("Invalid Optioin !\n")
  168. return run()
  169. run()

Hackertarget:一款发现攻击面的工具的更多相关文章

  1. GitHub 上的十一款热门开源安全工具

    作为开源开发领域的基石,“所有漏洞皆属浅表”已经成为一条著名的原则甚至是信条.作为广为人知的Linus定律,当讨论开源模式在安全方面的优势时,开放代码能够提高项目漏洞检测效率的理论也被IT专业人士们所 ...

  2. 五款app原型设计工具对比

    五款app原型设计工具对比 Proto.io, Pixate, Origami, Framer & Form 本文由Panblack 翻译,原文作者 Tes Mat 我用五款“高保真”原型设计 ...

  3. 十九款web漏洞扫描工具

    1. Arachni Arachni是一款基于Ruby框架搭建的高性能安全扫描程序,适用于现代Web应用程序.可用于Mac.Windows及Linux系统的可移植二进制文件. Arachni不仅能对基 ...

  4. Web 项目可能会用到的20款优秀的开源工具

    开源的应用程序和它们的源代码可以免费获得,因为版权是属于任何进行过修改或者提交代码的人.大多数提供开源软件的公司都可以建立行业标准,因此可以获得有利的竞争优势. 很多的开源应用程序和工具都有很强的替代 ...

  5. [转]10款 Web 开发常备工具

    文章地址:https://my.oschina.net/u/2903254/blog/798135 工欲善其事,必先利其器.如今 Web 开发标准越来越高,Web 开发者也在不断寻找途径提升自己的技能 ...

  6. 赞!这款国产的SSH工具,好用到爆!

    之前分享 MobaXterm 时 有小伙伴留言说到了 FinalShell 我本来是一脸蒙蔽的 网上搜了一下 它们家的官网 打开官网 我一度怀疑自己进错了网站 简单(jianlou)的排版 像极了上个 ...

  7. GitHub 上 10 款免费开源 Windows 工具

    GitHub 上 10 款免费开源 Windows 工具 GitHub 是如今所有开源事物的中央仓库, 这个网站最近发布了一个叫做<2016 Octoverse  状态报告>,详细列出了从 ...

  8. 100行Python代码实现一款高精度免费OCR工具

    近期Github开源了一款基于Python开发.名为 Textshot 的截图工具,刚开源不到半个月已经500+Star. 很多人学习python,不知道从何学起.很多人学习python,掌握了基本语 ...

  9. Nikto是一款Web安全扫描工具,可以扫描指定主机的web类型,主机名,特定目录,cookie,特定CGI漏洞,XSS漏洞,SQL注入漏洞等,非常强大滴说。。。

    Nikto是一款Web安全扫描工具,可以扫描指定主机的web类型,主机名,特定目录,cookie,特定CGI漏洞,XSS漏洞,SQL注入漏洞等,非常强大滴说... root@xi4ojin:~# cd ...

随机推荐

  1. Nginx HTTP服务器配置模板

    https://github.com/h5bp/server-configs-nginx

  2. 使用python批量造测试数据

    # -*- coding:utf-8 -*- import json import os import time class Virtual_Data: def __init__(self): sel ...

  3. python-windows安装相关问题

    1.python的环境配置,有些时候是没有配置的,需要在[系统环境]-[path]里添加. 2.安装pip:从官网下载pip包,然后到包目录==>python setup.py install  ...

  4. delegate:动态绑定js事件

    $('.videomodule').delegate("span", "click", function() { var i = $(this).index() ...

  5. Task异步

    快速示例 class Program { static void Main(string[] args) { //Console.WriteLine("main start..") ...

  6. Codeforces Round #442 (Div. 2) B题【一道模拟题QAQ】

    B. Nikita and string One day Nikita found the string containing letters "a" and "b&qu ...

  7. NOIP考前总结

    最近出的锅比较多啊,我来总结一下吧 $1.$小心文件名/文件输入输出!别打错了!结束前十分钟一定要检查! $2.$开数组前要算好内存,不要开一个$1e8$或$1e4*1e4$这样的大数组,直接GG $ ...

  8. python 批量创建文件及文件夹(文件夹里再创文件)

    python 批量创建文件及文件夹(文件夹里再创文件)思路:文件建到哪>文件名字叫啥>创建文件夹>去新建的文件下>新建文件>给文件里边写东西>写个反馈给控制台> ...

  9. 1632:【 例 2】[NOIP2012]同余方程

    #include<bits/stdc++.h> #define ll long long using namespace std; void Exgcd(ll a,ll b,ll & ...

  10. golang中文件以及文件夹路径相关操作

    获取目录中所有文件使用包: io/ioutil 使用方法: ioutil.ReadDir 读取目录 dirmane 中的所有目录和文件(不包括子目录) 返回读取到的文件的信息列表和读取过程中遇到的任何 ...