Let's explore the world of ethical hacking together!
Caution
This repository is strictly for educational purposes and promotes responsible and legal hacking practices. Always obtain proper authorization and adhere to ethical guidelines before conducting any security assessments.
- Identifying the target.
- you can use this website: [BugCrowd] (https://bugcrowd.com/)
One of the most critical stages for network mapping, information gathering, and vulnerability identification. you can find my own automated bash script code used in recon.sh file
Used Command line tools:
- theHarvester: Finding e-mail accounts, subdomain names, virtual hosts, IP addresses - https://github.com/laramies/theHarvester
- assetfinder: Finding Sub-domains - https://github.com/tomnomnom/assetfinder
- amass: Finding Root and Sub-domains - https://github.com/OWASP/Amass
- httprobe: Finding alive domains - https://github.com/tomnomnom/httprobe
- waybackurls: Traveling back to the past (find historical subdomains, endpoints, tokens&secrets, IDs&secret files) - https://github.com/tomnomnom/waybackurls
- whatweb: Web scanner - https://github.com/urbanadventurer/WhatWeb
- aquatone: Visual Inspection of Websites - https://github.com/michenriksen/aquatone
- nmap: Finding open ports and services - https://nmap.org/download.html
- Subjack: Subdomain Takeover - https://github.com/haccer/subjack
- GoWitness: Taking Screenshots of Websites - https://github.com/sensepost/gowitness
Credits
I would like to express my heartfelt gratitude to Heath Adams for their exceptional Ethical Hacking course on TCM Security Academy, which have been instrumental in enhancing my ethical hacking skills.