PwnDexter / HackTIve

Active Threat Intelligence Framework

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

HackTIve

Hacking Active Threat Intelligence Framework (HackTIve)

Intro & Setup

HackTIve is a work in progress legacy project I started to quickly map out a target organisations external domain footprint for technology leaks, domain fronting opportunities and more. One day I will finish it but today is not that day!

To install and setup do:

git clone https://github.com/PwnDexter/HackTIve.git
pip3 install -r requirements.txt
python3 HackTIve.py <args>

Roadmap & Ideas

  • - Perform WHOIS
    • - Rewrite in Python3
  • - Perform Reverse WHOIS
    • - Beautify the output
    • - Write out the domains to a file or array
  • - Perform DNS
    • - Rewrite in Python3
  • - Perform sub domain enumeration on identified domains
    • - Aquatone
    • - sublister
    • - other tools?
  • - Write out all domains and sub domains to a file or array and unique them and count them
  • - Perform domain front checking against all identified domains and sub domains
  • - Look into third party api calls such as shodan, pastebin, hunter, wayback machine/url etc. and see if any are of use.
  • - Perform Cert transparency query and pull out subdomains i.e., https://crt.sh/?q=%25.target.com

About

Active Threat Intelligence Framework

License:BSD 3-Clause "New" or "Revised" License


Languages

Language:Python 100.0%