Hackertarget:一款发现攻击面的工具
前言
https://github.com/ismailtasdelen/hackertarget
代码
主要通过这家公司提供的API查询相关数据实现的功能,API看起来可以用很久。
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests
hackertarget_logo = """
_ _ _ _
| |_ __ _ __ | |__ ___ _ _ | |_ __ _ _ _ __ _ ___ | |_
| ' \ / _` |/ _|| / // -_)| '_|| _|/ _` || '_|/ _` |/ -_)| _|
|_||_|\__,_|\__||_\_\\___||_| \__|\__,_||_| \__, |\___| \__|
|___/
Ismail Tasdelen
| github.com/ismailtasdelen | linkedin.com/in/ismailtasdelen |
"""
menu = """
[1] Traceroute
[2] Ping Test
[3] DNS Lookup
[4] Reverse DNS
[5] Find DNS Host
[6] Find Shared DNS
[7] Zone Transfer
[8] Whois Lookup
[9] IP Location Lookup
[10] Reverse IP Lookup
[11] TCP Port Scan
[12] Subnet Lookup
[13] HTTP Header Check
[14] Extract Page Links
[15] Exit
"""
print hackertarget_logo
print menu
def run():
try:
choice = input("Which option number : ")
if choice == 1:
print("\n")
print("[+] Traceroute script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/mtr/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 2:
print("\n")
print("[+] Ping Test script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/nping/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 3:
print("\n")
print("[+] DNS Lookup script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/dnslookup/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 4:
print("\n")
print("[+] Reverse DNS script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/reversedns/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 5:
print("\n")
print("[+] Find DNS Host script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/hostsearch/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 6:
print("\n")
print("[+] Find Shared DNS script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/findshareddns/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 7:
print("\n")
print("[+] Zone Transfer script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/zonetransfer/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 8:
print("\n")
print("[+] Whois Lookup script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/whois/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 9:
print("\n")
print("[+] IP Location Lookup script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/geoip/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 10:
print("\n")
print("[+] Reverse IP Lookup script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/reverseiplookup/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 11:
print("\n")
print("[+] TCP Port Scan script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/nmap/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 12:
print("\n")
print("[+] Subnet Lookup script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/subnetcalc/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 13:
print("\n")
print("[+] HTTP Header Check script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/httpheaders/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 14:
print("\n")
print("[+] Extract Page Links script running..")
target = raw_input("[+] Target : ")
print("\n")
url = "https://api.hackertarget.com/pagelinks/?q=" + target
request = requests.get(url)
txt = request.text
print(txt)
elif choice == 15:
exit()
except KeyboardInterrupt:
print("\nAborted!")
quit()
except:
print("Invalid Optioin !\n")
return run()
run()
Hackertarget:一款发现攻击面的工具的更多相关文章
- GitHub 上的十一款热门开源安全工具
作为开源开发领域的基石,“所有漏洞皆属浅表”已经成为一条著名的原则甚至是信条.作为广为人知的Linus定律,当讨论开源模式在安全方面的优势时,开放代码能够提高项目漏洞检测效率的理论也被IT专业人士们所 ...
- 五款app原型设计工具对比
五款app原型设计工具对比 Proto.io, Pixate, Origami, Framer & Form 本文由Panblack 翻译,原文作者 Tes Mat 我用五款“高保真”原型设计 ...
- 十九款web漏洞扫描工具
1. Arachni Arachni是一款基于Ruby框架搭建的高性能安全扫描程序,适用于现代Web应用程序.可用于Mac.Windows及Linux系统的可移植二进制文件. Arachni不仅能对基 ...
- Web 项目可能会用到的20款优秀的开源工具
开源的应用程序和它们的源代码可以免费获得,因为版权是属于任何进行过修改或者提交代码的人.大多数提供开源软件的公司都可以建立行业标准,因此可以获得有利的竞争优势. 很多的开源应用程序和工具都有很强的替代 ...
- [转]10款 Web 开发常备工具
文章地址:https://my.oschina.net/u/2903254/blog/798135 工欲善其事,必先利其器.如今 Web 开发标准越来越高,Web 开发者也在不断寻找途径提升自己的技能 ...
- 赞!这款国产的SSH工具,好用到爆!
之前分享 MobaXterm 时 有小伙伴留言说到了 FinalShell 我本来是一脸蒙蔽的 网上搜了一下 它们家的官网 打开官网 我一度怀疑自己进错了网站 简单(jianlou)的排版 像极了上个 ...
- GitHub 上 10 款免费开源 Windows 工具
GitHub 上 10 款免费开源 Windows 工具 GitHub 是如今所有开源事物的中央仓库, 这个网站最近发布了一个叫做<2016 Octoverse 状态报告>,详细列出了从 ...
- 100行Python代码实现一款高精度免费OCR工具
近期Github开源了一款基于Python开发.名为 Textshot 的截图工具,刚开源不到半个月已经500+Star. 很多人学习python,不知道从何学起.很多人学习python,掌握了基本语 ...
- Nikto是一款Web安全扫描工具,可以扫描指定主机的web类型,主机名,特定目录,cookie,特定CGI漏洞,XSS漏洞,SQL注入漏洞等,非常强大滴说。。。
Nikto是一款Web安全扫描工具,可以扫描指定主机的web类型,主机名,特定目录,cookie,特定CGI漏洞,XSS漏洞,SQL注入漏洞等,非常强大滴说... root@xi4ojin:~# cd ...
随机推荐
- Nginx HTTP服务器配置模板
https://github.com/h5bp/server-configs-nginx
- 使用python批量造测试数据
# -*- coding:utf-8 -*- import json import os import time class Virtual_Data: def __init__(self): sel ...
- python-windows安装相关问题
1.python的环境配置,有些时候是没有配置的,需要在[系统环境]-[path]里添加. 2.安装pip:从官网下载pip包,然后到包目录==>python setup.py install ...
- delegate:动态绑定js事件
$('.videomodule').delegate("span", "click", function() { var i = $(this).index() ...
- Task异步
快速示例 class Program { static void Main(string[] args) { //Console.WriteLine("main start..") ...
- Codeforces Round #442 (Div. 2) B题【一道模拟题QAQ】
B. Nikita and string One day Nikita found the string containing letters "a" and "b&qu ...
- NOIP考前总结
最近出的锅比较多啊,我来总结一下吧 $1.$小心文件名/文件输入输出!别打错了!结束前十分钟一定要检查! $2.$开数组前要算好内存,不要开一个$1e8$或$1e4*1e4$这样的大数组,直接GG $ ...
- python 批量创建文件及文件夹(文件夹里再创文件)
python 批量创建文件及文件夹(文件夹里再创文件)思路:文件建到哪>文件名字叫啥>创建文件夹>去新建的文件下>新建文件>给文件里边写东西>写个反馈给控制台> ...
- 1632:【 例 2】[NOIP2012]同余方程
#include<bits/stdc++.h> #define ll long long using namespace std; void Exgcd(ll a,ll b,ll & ...
- golang中文件以及文件夹路径相关操作
获取目录中所有文件使用包: io/ioutil 使用方法: ioutil.ReadDir 读取目录 dirmane 中的所有目录和文件(不包括子目录) 返回读取到的文件的信息列表和读取过程中遇到的任何 ...