theHarvester - gathering and monitoring domain and customer internet footprints
-
theharvester Package Description
The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
This tool is intended to help Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.
This is a complete rewrite of the tool with new features like:
Time delays between request All sources search Virtual host verifier Active enumeration (DNS enumeration, Reverse lookups, TLD expansion) Integration with SHODAN computer database, to get the open ports and banners Save to XML and HTML Basic graph with stats New sources
Source: https://github.com/laramies/theHarvester/
Author: Christian Martorella License: GPLv2
Tools included in the theharvester package
theharvester – A tool for gathering e-mail accounts and subdomain names from public sources
- https://tools.kali.org/information-gathering/theharvester
- https://github.com/laramies/theHarvester
- https://gitlab.com/kalilinux/packages/theharvester
- https://github.com/laramies/theHarvester/wiki/Installation
$ ~ > git clone https://github.com/laramies/theHarvester $ ~ > cd theHarvester $ ~ > docker build -t theharvester . $ ~ > docker run theharvester -h
It is a command-line tool but I could certainly have uses for it via the API.
-
Open Source Self-Hosted theHarvester OSINT Tool Alternatives | AlternativeTo
https://alternativeto.net/software/theharvester-osint-tool/?license=opensource&platform=self-hosted -
@hillside502 Cool, added this from that list of one: