dn0m1n8tor / project-morya

Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in an organized way

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

banner

Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in an organized way. This Project was built to automate my recon process, and after working on this project for months, I thought to make Project Morya public.

Please feel free to improve it in any way you can. There is no secret involved, and it's just a set of commands and existing tools written in bash-scripts for simple Recon Automation.

Currently this tools supports performing recon for:

  1. Subdomain Enumeration:
    It just enumerate subdomain

  2. Medium Level Scan:
    It scan's for [ subdomain Enumeration, subdomain Takeover, wayback_Urls, probing_Domains, nuclei_Scanning, port_Scanning ]

  3. Advance level Scan:
    It scan's for [ subdomain Enumeration, subdomain Takeover, wayback_Urls, probing_Domains, nuclei_Scanning, port_Scanning, dirsearch, xss scan ]

Installation Instructions

Note : Run this commands as a root user

$ git clone https://github.com/anubhavsinghhacker/project-morya.git
$ cd project-morya
$ chmod +x install.sh project_Morya.sh
$ ./install.sh

Usage

./project_Morya -h

This will display help for the tool. Here are all the switches it supports.

πŸ‘‰ Project Morya help menu πŸ‘ˆ
Usage of ./project_MOrya:
 
  -s
        for only subdomain enumeration
  -m
        for medium level scan [subdomain Enumeration, subdomain Takeover, wayback_Urls, probing_Domains, nuclei_Scanning, port_Scanning]
  -a
        for advance level scan [subdomain Enumeration, subdomain Takeover, wayback_Urls, probing_Domains, nuclei_Scanning, port_Scanning, dirsearch, xss scan] 

Running Project Morya

To run the tool on a target, just use the following command.

  1. Subdomain Enumeration : ./project_Morya.sh -s
  2. Medium Level Recon : ./project_Morya.sh -m
  3. Advance Scope Recon : ./project_Morya.sh -a

Youtube Video

βš™οΈ Config files

πŸ‘‰ Configure your files πŸ‘ˆ

1. Notify [ Most Important ]

I have written an article to setup Notify : https://anubhav-singh.medium.com/notification-system-for-your-bug-bounty-automation-7b13af1b7372

2. Subfinder

Link of the Article πŸ‘‡
image

3. Amass

Link of the Article πŸ‘‡
image

4. Github-subdomains

Link of the Article πŸ‘‡
image

Note : Keep atleast 5 tokens in $HOME/.config/github-subdomains/tokens.txt image

5. Shodan cli

shodan init YOUR_API_KEY

6. XXS hunter domain

  1. Signup on xsshunter.com
  2. Generate your custom domain
  3. Now Hard code this domain in xss_hunter.lib xss hunter

If you have properly configured files then you are all set to use this framework

✈️ AutoFlight mode

πŸ‘‰ Using screen command πŸ‘ˆ

screen command in Linux provides the ability to launch and use multiple shell sessions from a single ssh session. When a process is started with β€˜screen’, the process can be detached from session & then can reattach the session at a later time. When the session is detached, the process that was originally started from the screen is still running and managed by the screen itself. The process can then re-attach the session at a later time, and the terminals are still there, the way it was left

Steps to use screen command

  • To list active screens

    • screen -ls
  • Name this session

    • screen -S <name>
  • If you see detach then to this

    • screen -r <number/name>
  • If you see reattach then to this

    • screen -d <number/name> => [ To detach your screen ]
    • screen -r <number/name> => [ To reattach your screen ]

Youtube Video

Further Reference : https://www.geeksforgeeks.org/screen-command-in-linux-with-examples/

πŸ”© Tools Used

πŸ‘‰ Tools used in project πŸ‘ˆ
 1. subfinder
 2. ctfr.py
 3. Assestfinder
 4. Findomain
 5. sd-goo
 5. shodan
 6. anew
 7. amass
 8. gauplus
 9. waybackurls
10. github-subdomains
11. Crobat
12. Puredns
13. DNSCewl
14. dnsvalidator
15. httpx
16. Gospider
17. Notify
18. Unfurl
19. Unimap
20. Subjack
21. Dirsearch
22. Parmaspider
23. kxss
24. Dnsx
25. jq
26. Naabu
27. Nmap
28. Dalfox
29. Nuclei
30. xsshunter

PR Notes

  1. Please create a PR for the Feature Request.
  2. If you want to add your method/tool to project than make PR for it.
  3. If there is any missing part in install.sh please create a PR for it.
  4. For specific tool related issue such as installation for X tool used by Project Morya is not successful, please do not create a PR for it. As this issue is required to be Raise to the specific Tool Owner.

Please feel free to contribute....

Support

If you like Project Morya and it help you in work, money/bounty, pentesting, recon or just brings you happy feelings, please show your support ! ❀️
Buy Me A Chai

About

Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in an organized way

License:GNU General Public License v3.0


Languages

Language:Shell 95.3%Language:Python 4.7%