zoukankan      html  css  js  c++  java
  • Hackertarget:一款发现攻击面的工具

    前言

    https://github.com/ismailtasdelen/hackertarget

    代码

    主要通过这家公司提供的API查询相关数据实现的功能,API看起来可以用很久。

    #!/usr/bin/env python
    # -*- coding: utf-8 -*-
    
    import requests
    
    hackertarget_logo = """
      _               _              _                          _
     | |_   __ _  __ | |__ ___  _ _ | |_  __ _  _ _  __ _  ___ | |_
     | '  / _` |/ _|| / // -_)| '_||  _|/ _` || '_|/ _` |/ -_)|  _|
     |_||_|\__,_|\__||_\_\___||_|   \__|\__,_||_|  \__, |\___| \__|
                                                    |___/
                     Ismail Tasdelen
     | github.com/ismailtasdelen | linkedin.com/in/ismailtasdelen |
    """
    
    menu = """
    [1] Traceroute
    [2] Ping Test
    [3] DNS Lookup
    [4] Reverse DNS
    [5] Find DNS Host
    [6] Find Shared DNS
    [7] Zone Transfer
    [8] Whois Lookup
    [9] IP Location Lookup
    [10] Reverse IP Lookup
    [11] TCP Port Scan
    [12] Subnet Lookup
    [13] HTTP Header Check
    [14] Extract Page Links
    [15] Exit
    """
    
    print hackertarget_logo
    print menu
    
    def run():
    
        try:
            choice = input("Which option number : ")
    
            if choice == 1:
                print("
    ")
                print("[+] Traceroute script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/mtr/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 2:
                print("
    ")
                print("[+] Ping Test script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/nping/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 3:
                print("
    ")
                print("[+] DNS Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/dnslookup/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 4:
                print("
    ")
                print("[+] Reverse DNS script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/reversedns/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 5:
                print("
    ")
                print("[+] Find DNS Host script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/hostsearch/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 6:
                print("
    ")
                print("[+] Find Shared DNS script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/findshareddns/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 7:
                print("
    ")
                print("[+] Zone Transfer script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/zonetransfer/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 8:
                print("
    ")
                print("[+] Whois Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/whois/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 9:
                print("
    ")
                print("[+] IP Location Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/geoip/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 10:
                print("
    ")
                print("[+] Reverse IP Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/reverseiplookup/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 11:
                print("
    ")
                print("[+] TCP Port Scan script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/nmap/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 12:
                print("
    ")
                print("[+] Subnet Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/subnetcalc/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 13:
                print("
    ")
                print("[+] HTTP Header Check script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/httpheaders/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 14:
                print("
    ")
                print("[+] Extract Page Links script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/pagelinks/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 15:
                exit()
    
        except KeyboardInterrupt:
            print("
    Aborted!")
            quit()
        except:
            print("Invalid Optioin !
    ")
            return run()
    run()
    
  • 相关阅读:
    Halcon一日一练:图像分割之基本概念
    Halcon一日一练:创建AOI
    Halcon一日一练:获取图像属性
    Halcon一日一练:创建三通道图像
    Halcon一日一练:Halcon异常判断方法
    Java基础_类的加载机制和反射
    Java基础_死锁、线程组、定时器Timer
    Java基础_通过模拟售票情景解决线程不安全问题
    Java基础_线程的使用及创建线程的三种方法
    HTML/HTML5 知识点思维导图
  • 原文地址:https://www.cnblogs.com/17bdw/p/10842038.html
Copyright © 2011-2022 走看看