https://github.com/charfweh/frontface
recon script for THM and HTB rooms/challs
https://github.com/charfweh/frontface
automation footprint hackthebox pentesting pentesting-tools reconnaissance shell-script tryhackme tryhackme-writeups
Last synced: 16 days ago
JSON representation
recon script for THM and HTB rooms/challs
- Host: GitHub
- URL: https://github.com/charfweh/frontface
- Owner: charfweh
- Created: 2023-09-12T14:04:13.000Z (over 1 year ago)
- Default Branch: master
- Last Pushed: 2023-09-20T13:06:38.000Z (over 1 year ago)
- Last Synced: 2025-02-15T22:44:01.002Z (2 months ago)
- Topics: automation, footprint, hackthebox, pentesting, pentesting-tools, reconnaissance, shell-script, tryhackme, tryhackme-writeups
- Language: Shell
- Homepage:
- Size: 133 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
:satellite: FrontFace
:beginner: Your own initial recon for pentest!
# :mega: About
FrontFace is a initial recon tool made for pentesting TryHackme and HackTheBox challenges.# :question: Why?
- It saves time
- Get rid of repetitive commands by automating it
- Organized, so you can eyeball stuff
- Customizable, throw in full port scan, change the wordlist and more## :question: How?
To run FrontFace
```bash
chmod +x frontface.sh
./frontface.sh [IP]
```# :pushpin: What does it do?
- It runs nmap to scan for open ports
- Runs service and version enumeration against those open ports
- If there's _http_ service, runs gobuster
- Cats out the results
- Cheers you up!## :pushpin: Note
It relies on the following tools:
- Seclists for wordlists
- Nmap
- Gobuster
- _Full port scan is disabled by default, uncomment the code to enable it_# :hammer: Todo
- Add support for smb enumeration
- Add support for ftp enumuerationThanks for reading, Contributions of any kind is welcomed!