HackTIve
Hacking Active Threat Intelligence Framework (HackTIve)
Intro & Setup
HackTIve is a work in progress legacy project I started to quickly map out a target organisations external domain footprint for technology leaks, domain fronting opportunities and more. One day I will finish it but today is not that day!
To install and setup do:
git clone https://github.com/PwnDexter/HackTIve.git
pip3 install -r requirements.txt
python3 HackTIve.py <args>
Roadmap & Ideas
- - Perform WHOIS
- - Rewrite in Python3
- - Perform Reverse WHOIS
- - Beautify the output
- - Write out the domains to a file or array
- - Perform DNS
- - Rewrite in Python3
- - Perform sub domain enumeration on identified domains
- - Aquatone
- - sublister
- - other tools?
- - Write out all domains and sub domains to a file or array and unique them and count them
- - Perform domain front checking against all identified domains and sub domains
- - Look into third party api calls such as shodan, pastebin, hunter, wayback machine/url etc. and see if any are of use.
- - Perform Cert transparency query and pull out subdomains i.e., https://crt.sh/?q=%25.target.com