Recon & enumeration
whois · DNS · theHarvester · Shodan · Google dorks · enum4linux · LDAP
OSINT enumeration of emails, subdomains, hosts, employees, and open ports from public sources (search engines, certificate transparency, PGP servers, etc.). Your first-pass recon tool against a known domain.
API keys for Hunter / Shodan / DNSdumpster significantly improve results.
Modular framework for web-based reconnaissance, modeled on Metasploit's console UX. Workspaces store findings; modules pull from APIs and bulk-process targets.
Many modules require free API keys (Shodan, Censys, HIBP). Configure once via keys add.
Search engine for internet-connected devices, indexed by banner, port, service, and CVE. Externally-facing recon for any IP / org / hostname.
Free tier is heavily limited. CLI tool (pip install shodan) is more efficient than the web UI for scripted work.
whois example.comwhois 203.0.113.1dig +nocmd example.com any +multiline +noall +answerANY queries blocked by many resolvers — run each type separately: A, MX, NS, TXT, SOA
dnsrecon -d example.com -t stddnsrecon -d example.com -t brt -D /usr/share/wordlists/dnsmap.txtdnsrecon -d example.com -t axfrSucceeds only on misconfigured nameservers — gives full DNS inventory
dnsenum --enum -p 0 -s 0 example.comamass enum -passive -d example.comBest passive subdomain tool — uses 50+ data sources
amass enum -active -d example.com -brute -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-5000.txtsubfinder -d example.com -silenttheHarvester -d example.com -b alltheHarvester -d example.com -b google -l 500theHarvester -d example.com -b shodantheHarvester -d example.com -b linkedinshodan search "org:\"Target Corp\"" --fields ip_str,port,product,versionshodan search "hostname:example.com" --fields ip_str,port,productshodan host 203.0.113.1shodan search "ssl.cert.subject.cn:example.com"org:"Target Corp" port:3389 country:UShostname:example.com http.title:"Admin" -http.status:404net:203.0.113.0/24 vuln:CVE-2021-26855site:example.com -wwwsite:example.com filetype:pdf OR filetype:xlsx OR filetype:docxsite:example.com inurl:admin OR inurl:login OR inurl:portalsite:pastebin.com "example.com" password OR key OR credential"example.com" filetype:sql OR filetype:env OR filetype:configenum4linux -a 192.168.1.100enum4linux-ng -A 192.168.1.100 -u "" -p ""ldapsearch -x -H ldap://192.168.1.100 -b "dc=example,dc=com" "(objectClass=*)"Anonymous bind usually disabled on secured DCs but common on misconfigs
ldapsearch -x -H ldap://192.168.1.100 -D "cn=user,dc=example,dc=com" -w "Password1" -b "dc=example,dc=com" "(objectClass=user)" sAMAccountName mail memberOfldapsearch -x -H ldap://dc.example.com -b "dc=example,dc=com" "(objectClass=computer)" name dNSHostName operatingSystem