https://github.com/luanqmata/powerdinspec
👁️🔍- POWER DNS INSPEC - PowerShell-based toolkit to scan headers, links, robots.txt, and detect site technologies. 👨💻
https://github.com/luanqmata/powerdinspec
cybersecurity dncrecon dns pentest powershell recontool robots-txt websitescanner
Last synced: 5 months ago
JSON representation
👁️🔍- POWER DNS INSPEC - PowerShell-based toolkit to scan headers, links, robots.txt, and detect site technologies. 👨💻
- Host: GitHub
- URL: https://github.com/luanqmata/powerdinspec
- Owner: Luanqmata
- License: gpl-3.0
- Created: 2025-09-19T21:19:19.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-09-29T07:30:02.000Z (5 months ago)
- Last Synced: 2025-09-29T09:21:52.798Z (5 months ago)
- Topics: cybersecurity, dncrecon, dns, pentest, powershell, recontool, robots-txt, websitescanner
- Language: PowerShell
- Homepage:
- Size: 111 KB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# PowerDiNSpec

---

---

---
## **PowerShell DNS Recon Tool**
PowerDiNSpec is a PowerShell-based tool designed to help security enthusiasts and penetration testers perform reconnaissance on websites and DNS records. It allows you to scan server headers, HTTP methods, links, HTML words, detect technologies, check status codes, and more.
---
## Features
* Capture server headers
* Discover allowed HTTP methods
* List links found in HTML
* Extract words from website HTML for fuzzing
* Detect technologies in use (X-Powered-By, Server)
* Get HTTP status codes
* Retrieve the `` of the page
* Check for `robots.txt`
* Check for `sitemap.xml`
* Check for Banner
* resolve ip Address
* Scaning Records Server
* Run all scans automatically
* Log all actions to a file
---
## Security & Ethical Use Notice ⚠️
PowerDiNSpec is intended only for educational purposes, authorized penetration testing, or personal lab environments.
Using this tool on websites or networks without explicit permission from the owner may be illegal and could result in criminal or civil penalties.
Always ensure you have authorization before scanning any system and respect the ethical guidelines of cybersecurity.
---
## Installation
1. Make sure you have **PowerShell 5.1** or later installed on Windows.
2. Clone or download this repository:
```ruby
git clone https://github.com/Luanqmata/PowerDiNSpec.git
```
3. Navigate to the folder:
```ruby
cd PowerDiNSpec
```
4. Unlock Script
5. unlock 4 win 11 - (type to unlock)
```ruby
Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope Process
```
---
## Usage
1. Open PowerShell.
2. Run the script:
```ruby
.\PowerDiNSpec.ps1
```
3. The menu will appear. Choose an option (1-13) to perform the desired scan.
4. Enter the target URL or host when prompted.
5. Logs will be automatically saved in the script directory with timestamps.
6. Press Enter to return to the menu after each scan.
---
## Example
Run all scans for a website:
```ruby
Choose option: 10
Enter the website URL (e.g., https://example.com)
```
The tool will sequentially run all checks and display the results in the terminal.
---
## License
This program is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).
You can redistribute and/or modify it under the terms of this license.
---
## Author
Luan Calazans, 2025
Powered by PowerShell ☕💻
---
## References
> https://github.com/EliteLoser/WriteAscii/blob/master/letters.xml Fonts