ℹ️Information Gathering

whois google.com
whois 216.58.206.46
nbtstat -A 192.168.1.99
nbtscan -f addresses.txt
fping 50.116.66.139 173.194.35.35 98.139.183.24
fping -s -g 192.168.0.1 192.168.0.9
fping -g -r 1 192.168.0.0/24
tcptraceroute api.opendns.com 443
tcptraceroute -T domainname
traceroute example.com
xprobe2 google.com
xprobe2 -D 11 google.com
sslyze --regular bugcrowd.com
tcpdump host 1.1.1.1
tcpdump -i eth0
tshark -i wlan0 -w capture-output.pcap
tshark -r capture-output.pcap
wireshark
./subbrute.py target.com
dnsenum --enum hackthissite.org
dnsenum hackthissite.org
./dnsrecon.py -d <domain>
./dnsrecon.py -d <domain> -t axfr
dnstracer www.mavetju.org
enum4linux -v 172.168.0.6
enum4linux -u 192.168.2.55
hping3 -S 192.168.1.10 -p 80
hping3 –traceroute -S {target ip}
dotdotpwn.pl -m http -h 192.168.1.1 -M GET
golismero scan http://www.0x00sec.org 
golismero scan http://www.0x00sec.org -o /root/scan.txt 
netmask -c google.com
netmask -r 192.168.217.0/24
knockpy domain.com
knockpy domain.com -w wordlist.txt
lbd example.com
python angryFuzzer.py -u http://www.techtrick.in
miranda -i eth0 -v
ncat 192.168.1.100 80
wafw00f https://equifaxsecurity2017.com
python inforfinder.py --help
masscan -p22,80,445 192.168.1.0/24
masscan 10.0.0.0/8 192.168.0.0/16 172.16.0.0/12 -p80
python-faraday -h
tlssled 192.168.1.1 443
sslsplit -D -l connections.log -j /tmp/sslsplit/ -S /tmp/ -k ca.key -c ca.crt ssl 0.0.0.0 8443 tcp 0.0.0.0 8080
dmitry -winsepo example.txt example.com
dmitry -wise -o Comrade.txt scanme.nmap.org
urlcrazy -k dvorak -r example.com
./dnsmap google.com
  • dnmap_client watch

dnmap_client -s <server-ip> -a <alias></alias></server-ip>
dnswalk -r -d example.com.
dnswalk example.com.
fierce -dns example.com -threads 10
fragrouter -i eth0 -F1
  • ftest watch

./ftest -f ftest.conf
arping  192.168.122.1
arping -s aa:bb:cc:dd:ee:ff  192.168.122.1
arping -c 2 192.168.122.1
cdpsnarf -i eth0 -w cdpsnarf.pcap
  • unicornscan [watch](https://www.youtube.com/watch?v=X _DdYUeKS-o)

unicornscan -v -I -mT [IP ADDRESS]
unicornscan -mTsf -Iv -r 1000 192.168.0.102:a
nmap cloudflare.com
nmap --top-ports 20 192.168.1.106
nmap -oX output.xml securitytrails.com
theHarvester -d sixthstartech.com -l 300 -b all
theHarvester.py -d wonderhowto.com -b all -l 200
twofi -h
./0trace.sh wlan0 69.63.181.12
intrace -h hostname.com -p port -s sizeofpacket
intrace -h www.example.com -p 80 -s 4
netdiscover -i eth0 -r 192.168.43.0/24
smbmap -u victim -p s3cr3t -H 192.168.86.61
smbmap -H 192.168.1.102
snmp-check 192.168.1.2 -c public
swaks --to [email protected]
swaks --to [email protected] --server smtp.example.com
gobuster dir -u https://buffered.io -w ~/wordlists/shortlist.txt
smtp-user-enum -M VRFY -U /root/Desktop/user.txt -t 192.168.1.107
smtp-user-enum -M VRFY -u root -t 192.168.1.25
braa 10.253.101.1-10.253.101.254:.1.3.6.1.2.1.1.6.0
braa [email protected]:.1.3.6.*
onesixtyone -c dict.txt 192.168.1.119
ssldump -i le0 port 443
ssh -p 443 [email protected]
sslscan sail.co.in
sslscan https://www.cylance.com
  • ike-scan watch

ike-scan 192.168.49.2
recon-ng
 
p0f -i eth0 -p -o /tmp/p0f.log
acccheck -t IP ADDRESS
acccheck -t 10.0.2.15 -U mynames.txt -P mypasswords.txt
address6
alive6
covert_send6
covert_send6d
denial6
detect-new-ip6
detect_sniffer6
dnsdict6
dnsrevenum6
dos-new-ip6
dump_router6
exploit6
.
.
.
.
casefile
jigsaw –s company name
metagoofil -d kali.org -t pdf -l 100 -n 25 -o kalipdf -f kalipdf.html
sslcaudit -l 0.0.0.0:443 -v 1 
stunnel4
tcpflow -ce host 192.168.0.100
ace -i eth0 -m 00:1E:F7:28:9C:8e
ace -r eth0.96
amap -bqv 192.168.1.15 80
apt2 -h
bing-ip2hosts -p microsoft.com
bing-ip2hosts -p 173.194.33.80
automater 185.62.190.110
automater corefitness.info
automater b9318a66fa7f50f2f3ecaca02a96268ad2c63db7554ea3acbde43bf517328d06
cisco-torch -A 10.1.1.0/24
enumiax -d /usr/share/wordlists/metasploit/unix_users.txt 192.168.1.1
eyewitness -f /root/urls.txt -d screens --headless
goofile -d kali.org -f pdf
ident-user-enum 192.168.1.13 22 139 445
inspy -h
ismtp
nikto -Help
ntop -B "src host 192.168.1.1"
parsero -u www.bing.com -sb
usufy.py -h
mailfy.py -h
searchfy.py -h
domainfy.py -h
phonefy.py -h
entify.py -h
osrfconsole.py
sublist3r -d kali.org -t 3 -e bing
sublist3r -d google.com -b -t 100
  • ffuf watch

ffuf -w /path/to/wordlist -u https://target/FUZZ
  • Amass watch

amass enum -d example.com
  • AQUATONE watch

 cat targets.txt | aquatone
netscanner sp tcp 127.0.0.1 80
sudo apt-get install python-wxgtk2.8 git nmap
git clone https://github.com/wereallfeds/webshag
cd webshag/
./setup.linux.py
./webshag_gui.py
git clone https://github.com/beurtschipper/Depix.git
cd Depix

python -m pip install -r requirements.txt

python depix.py -p /path/to/your/input/image.png -s images/searchimages/debruinseq_notepad_Windows10_closeAndSpaced.png -o /path/to/your/output.png
python3 main.py <target username> --command <command>
# clone the repo
$ git clone https://github.com/sherlock-project/sherlock.git

# change the working directory to sherlock
$ cd sherlock

# install the requirements
$ python3 -m pip install -r requirements.txt

# search user name
python3 sherlock [user_name]

Last updated

Was this helpful?