Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/leobeosab/sharingan
Offensive Security recon tool
https://github.com/leobeosab/sharingan
dns go nmap recon security
Last synced: 3 months ago
JSON representation
Offensive Security recon tool
- Host: GitHub
- URL: https://github.com/leobeosab/sharingan
- Owner: leobeosab
- Created: 2019-11-06T05:08:40.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2021-08-27T14:22:48.000Z (about 3 years ago)
- Last Synced: 2024-04-12T19:43:54.680Z (7 months ago)
- Topics: dns, go, nmap, recon, security
- Language: Go
- Homepage:
- Size: 598 KB
- Stars: 92
- Watchers: 14
- Forks: 15
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - leobeosab/sharingan - Offensive Security recon tool (Go)
README
# Sharingan
Sharingan is a recon multitool for offensive security / bug bounty
WIP, will I ever finish? Who knows
## Cloning for development
Outside of your gopath
`git clone https://github.com/leobeosab/sharingan`## Installing
`go get github.com/leobeosab/sharingan/cmd/sharingancli`## Dependencies
* NMap
* Go## Usage
#### Note
Order matters when it comes to flags it must be `sharingancli [globalflags] command [commandflags]` if this isn't a wanted feature I can change it but I like how clean it is### DNS
#### bruteforce
DNS busts the target with a wordlist you provide
```
sharingancli --target targetname dns --dns-wordlist ~/path/to/wordlist --root-domain target.com
```
![dns example gif](./dns_example.gif)#### addsubs
Adds subdomains to the program's storage from stdin using pipes
```
cat subs | sharingancli --target targetname dns addsubs
```### Scan
Scans all hosts available that were stored in target using nmap
```
sharingancli --target target scan
```
![scan_example_gif](./scan_example.gif)#### interactive
Scan a single host from list of subdomains stored in target
```
sharingancli --target target scan interactive
```
![scan interactive_example gif](./scan_interactive_example.gif)### info
#### domains
Outputs all domains as a list in stdout
```
sharingancli --target target info domains
```
![info example](./info_example.png)## Features to come
* Dir brute forcing -- Currently being worked on
* JSON and regular file exports
* Automated scans through a daemon?
* add a way to do SYN / -sS scanning [ must be root so it presents a challenge ]
* Possible Web ui / html export