- For OS Linux: Debian / Ubuntu, etc.
git clone https://github.com/e-m3din4/domain-a-tricks.git
cd ~/Domain-A-Tricks
chmod +x domain-a-tricks.sh
sudo bash domain-a-tricks.sh [TARGET_DOMAIN]
Where TARGET_DOMAIN is the domain for the reconnaissance process. (e.g) targetdomain.com
This script automates the domain reconnaissance process using multiple tools. The script uses a combination of Python, Go, and bash scripts to gather information about a target domain. The results from each tool are saved in /results/ directory for further analysis.
The Censys API credentials (CENSYS_UID and CENSYS_SECRET) must be set before running the script. Censys, SecurityTrails and Zoomeye API credentials must be obtained and set before running the script. The following pip packages must be installed: censys, pysecuritytrails, zoomeye, photon
The following tools are used in the script, located at ~/Domain-A-Tricks/tools, make sure every tool is installed and fully-functional before running this script:
// Domain_Analyzer // Censys // Dirhunt // SecurityTrails // Zoomeye // Brutex // CloudFlair // Cloudfail // Cloudflare-Origin-IP // CloudUnflare // Subfinder // Bypass-firewalls-by-DNS-history // Photon (including VirusTotal, Shodan, Whois, AlienVault, Google Dorking, etc)
The obtained output from each tool will be saved in the results directory with the format tool_name-target_domain.txt.