Recon-ng

  • Marketplace search - shows all tools
  • Marketplace install hackertarget
  • Modules load hackertarget
    Info
    Options set source domain.com
    Run
    
    Marketplace install profiler
    Modules load profiler
    Info
    Options set source username
    

    OSINT Automation script (needs editing)

    ``` ‘#!/bin/bash domain=$1 RED=”\033[1;31m” RESET=”\033[0m”

info_path=$domain/info subdomain_path=$domain/subdomains screenshot_path=$domain/screenshots

if [ ! -d “$domain” ];then mkdir $domain fi

if [ ! -d “$info_path” ];then mkdir $info_path fi

if [ ! -d “$subdomain_path” ];then mkdir $subdomain_path fi

if [ ! -d “$screenshot_path” ];then mkdir $screenshot_path Fi

echo -e “${RED} [+] Checkin’ who it is…${RESET}” whois $1 > $info_path/whois.txt

echo -e “${RED} [+] Launching subfinder…${RESET}” subfinder -d $domain > $subdomain_path/found.txt

echo -e “${RED} [+] Running assetfinder…${RESET}” assetfinder $domain | grep $domain » $subdomain_path/found.txt

#echo -e “${RED} [+] Running Amass. This could take a while…${RESET}” #amass enum -d $domain » $subdomain_path/found.txt

echo -e “${RED} [+] Checking what’s alive…${RESET}” cat $subdomain_path/found.txt | grep $domain | sort -u | httprobe -prefer-https | grep https | sed ‘s/https\?:\/\///’ | tee -a $subdomain_path/alive.txt

echo -e “${RED} [+] Taking dem screenshotz…${RESET}” gowitness file -f $subdomain_path/alive.txt -P $screenshot_path/ –no-http’ ```