Skip to content

e-m3din4/domain-a-tricks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

Domain-a-Tricks

a domain-recon automated tool.

Installation & Usage

  • For OS Linux: Debian / Ubuntu, etc.

git clone https://github.com/e-m3din4/domain-a-tricks.git

cd ~/Domain-A-Tricks

chmod +x domain-a-tricks.sh

sudo bash domain-a-tricks.sh [TARGET_DOMAIN]

Where TARGET_DOMAIN is the domain for the reconnaissance process. (e.g) targetdomain.com

Description

This script automates the domain reconnaissance process using multiple tools. The script uses a combination of Python, Go, and bash scripts to gather information about a target domain. The results from each tool are saved in /results/ directory for further analysis.

Prerequisites

The Censys API credentials (CENSYS_UID and CENSYS_SECRET) must be set before running the script. Censys, SecurityTrails and Zoomeye API credentials must be obtained and set before running the script. The following pip packages must be installed: censys, pysecuritytrails, zoomeye, photon

Tools

The following tools are used in the script, located at ~/Domain-A-Tricks/tools, make sure every tool is installed and fully-functional before running this script:

Workbook

// Domain_Analyzer // Censys // Dirhunt // SecurityTrails // Zoomeye // Brutex // CloudFlair // Cloudfail // Cloudflare-Origin-IP // CloudUnflare // Subfinder // Bypass-firewalls-by-DNS-history // Photon (including VirusTotal, Shodan, Whois, AlienVault, Google Dorking, etc)

Output

The obtained output from each tool will be saved in the results directory with the format tool_name-target_domain.txt.