You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
BashScan is a port scanner built to utilize /dev/tcp for network and service discovery on systems that have limitations or are otherwise unable to use alternative scanning solutions such as nmap.
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple probes using retryabledns library, that allows you to perform multiple DNS queries of your choice with a list of user supplied resolvers, additionally supports DNS wildcard filtering like shuffledns.
Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other an how a potential attacker may exploit these interactions.
$nmap-A-T4-p--sS-sV-oNinitial--scriptdiscovery<RHOST>$nmap-A-T4-sC-sV--scriptvuln<RHOST>$nmap-sV--scripthttp-trace<RHOST>$nmap-sV--scriptssl-cert-p443<RHOST>$nmap-sV--scriptssl-enum-ciphers-p443<RHOST>$nmap-A-T4-p-<RHOST>$nmap-A-T4-sS-sU-v<RHOST>$nmap-sC-sV-oNinitial--scriptdiscovery<RHOST>$nmap-sC-sV-oAnmap<RHOST>$nmap-sS-sV<RHOST>$nmap-p-<RHOST>// full port scan$nmap-sS<RHOST>// ping scan$nmap-sT<RHOST>// TCP scan$nmap-sU<RHOST>// UDP scan$nmap-PR-sN<RHOST>// ARP scan$nmap-PP-sn<RHOST>// ICMP timestamp discovery$nmap-PM-sn<RHOST>// ICMP address mask discovery$nmap-PE-sn<RHOST>// ICMP echo discovery$nmap-PU-sn<RHOST>// UDP ping discovery$nmap-PS<RPORT><RHOST>// TCP SYN ping discovery$nmap-PA<RPORT><RHOST>// TCP ACK ping discovery$sudonmap-sS-f-p<RPORT><RHOST>// fragment packets for stealth$sudonmap-sS-ff-p<RPORT><RHOST>// fragmets packets double times for stealth$nmap--scriptsafe-p445<RHOST>// detailed scan on smb-p1-65535// ports-p-// all ports-sV// version detection-sS// TCP SYN scan-sT// TCP connect scan-sU// UDP scan-sX// Xmas scan (sets FIN, PSH, URG flags)-sC// script scan-T4// timing options-PN// no ping-oA// write to file (basename)-oN// write to file (normal)-sn// host discovery only-6// IPv6-n// no dns resolution-O// OS detection-A// aggressive scan-D// Decoy scan-f// fragment packets-S// spoof src ip address-g// spoof src port-n// no DNS lookup-R// Reverse DNS lookup--mtu// set MTU size--spoof-mac// spoof mac address--data-length<size>// append random data--scan-delay5s// delay--max-retries1// set retry limit to speed the scan up
$exportip=<RHOST>; forportin$(seq165535); dotimeout0.01bash-c"</dev/tcp/$ip/$port && echo The port $port is open || echo The Port $port is closed > /dev/null"2>/dev/null||echoConnectionTimeout> /dev/null; done