Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/sergio11/zero_trace_hacking_tool

ZeroTrace is an AI-powered ethical hacking tool πŸ”πŸ’» that generates optimized Google Dorks to uncover sensitive data and potential attack vectors on the web 🌐. It helps cybersecurity pros identify vulnerabilities through advanced search queries and detailed reporting πŸ“Šβš‘.
https://github.com/sergio11/zero_trace_hacking_tool

ai automation cybersecurity cybersecurity-tools data-reconnaissance data-security ethical-hacking ethical-hacking-tools google-dorks groq groq-api groq-integration information-gathering information-gathering-tools llama3 machine-learning python search-engine-dorking vulnerability-assessment

Last synced: 19 days ago
JSON representation

ZeroTrace is an AI-powered ethical hacking tool πŸ”πŸ’» that generates optimized Google Dorks to uncover sensitive data and potential attack vectors on the web 🌐. It helps cybersecurity pros identify vulnerabilities through advanced search queries and detailed reporting πŸ“Šβš‘.

Awesome Lists containing this project

README

        

# 🌐 **ZeroTrace**: The Ultimate Ethical Hacking & Search Engine Dorking Tool πŸ”πŸš€

Welcome to **ZeroTrace**, your go-to tool for ethical hacking and advanced search engine dorking! ⚑

ZeroTrace is an innovative tool designed for **cybersecurity professionals** and **ethical hackers** πŸ›‘οΈ to identify potential **attack vectors** 🌍 across the vast expanse of the **World Wide Web**. Whether you're performing reconnaissance on a target or conducting security research, ZeroTrace helps you uncover hidden and sensitive information πŸ”“ that may be exposed due to **misconfigurations** or **poor security practices**.

πŸ™ I would like to express my sincere gratitude to [Santiago HernΓ‘ndez, a leading expert in Cybersecurity and Artificial Intelligence](https://www.udemy.com/user/shramos/). His outstanding course on **Cybersecurity and Ethical Hacking**, available on Udemy, was instrumental in the development of this project. The insights and techniques I gained from his course were invaluable in guiding my approach to cybersecurity practices. Thank you for sharing your knowledge and expertise!

πŸ”’ **Disclaimer**: This tool is designed for educational and research purposes. Misuse of this tool could result in violation of laws and regulations. Please use responsibly.

## πŸ” **What is ZeroTrace?**

ZeroTrace helps **ethical hackers** and **security researchers** streamline the process of identifying sensitive information online. By generating precise and powerful Google Dorks, it automates reconnaissance activities, providing quick access to potential vulnerabilities and misconfigurations in systems exposed on the internet.

### With ZeroTrace, you can:
- πŸ”‘ **Transform your search queries** into **optimized Google Dorks** using **AI-powered LLMs**.
- πŸ“Š **Generate reports** with search results for documentation and analysis.
- πŸ“‚ **Download sensitive files** that may contain exposed data (e.g., `.pdf`, `.docx`, `.txt`, etc.).
- 🌐 Identify **potential attack vectors** by scanning for misconfigurations or leaked data online.

## 🌟 **Explore My Other Open-Source Ethical Hacking Tools**

If you're interested in more powerful tools for ethical hacking, make sure to check out my other open-source projects designed to help cybersecurity professionals and penetration testers:

- [πŸ¦… **NetHawk**](https://github.com/sergio11/nethawk_analyzer): A state-of-the-art **AI-powered ethical hacking tool** for **network vulnerability assessment**. Using advanced frameworks like **Scapy** and **Nmap**, NetHawk automates **port scanning**, **vulnerability detection**, and **report generation**, making security audits faster, smarter, and more efficient. Whether you're a **network administrator**, **cybersecurity expert**, or **ethical hacker**, NetHawk simplifies the assessment process and offers actionable insights to fortify your systems.
- [πŸ’€ **Nemesys**](https://github.com/sergio11/nemesys): An advanced **exploitation** and **post-exploitation** tool built on top of the **Metasploit Framework** for automating critical data harvesting and system enumeration.
- [πŸ•·οΈ **BlackVenom**](https://github.com/sergio11/blackvenom): The ultimate **ARP** and **DNS spoofing** tool for **intercepting network traffic** and uncovering vulnerabilities with stealth and precision.
- [πŸ” **DecryptX**](https://github.com/sergio11/decryptx): An **advanced hash and password security assessment tool** that helps **cybersecurity experts** and **penetration testers** analyze **password hashes** and **encrypted ZIP files** to assess the robustness of security implementations.

These tools are designed to streamline penetration testing, enhance security assessments, and provide in-depth insights into vulnerabilities. Explore them to level up your ethical hacking skills! πŸ’»πŸ”

## ⚑ **Key Features**

- **AI-Powered Dork Generation** πŸ€–: Leverages **LLMs like Llama3** through **Groq** to generate precise Google Dorks based on user descriptions.

- **Automated Search Queries** πŸ”: Perform advanced search queries using **Google Custom Search** to retrieve relevant results.

- **File Downloading** πŸ’Ύ: Automatically download files (e.g., `.pdf`, `.docx`, `.txt`) that expose sensitive information, streamlining your reconnaissance process.

- **Detailed Reports** πŸ“: Export search results in **HTML** and **JSON** formats for documentation and further analysis.

- **Customizable Filters** πŸ”§: Set specific search filters, such as file types or languages, to narrow down results and focus on the most relevant data.

## πŸš€ **How It Works**

1. **Configure API Keys** πŸ”: Set up your **Google API Key** and **Custom Search Engine ID**.
2. **Enter a Query**: Provide a search description or Google Dork directly.
3. **AI-Assisted Dork Generation**: ZeroTrace uses **LLMs** to generate Google Dorks based on user input.
4. **Retrieve Results**: Perform advanced searches and collect relevant information from the web.
5. **Download Files**: Automatically download files containing sensitive information.
6. **Export Reports**: Save your results in **HTML** or **JSON** formats for further analysis.

## πŸ§‘β€πŸ’» **Installation**

1. Clone the repository.
2. Install the required dependencies.
3. Set up your environment variables.
4. Run the tool.

## πŸ› οΈ **API Key Configuration**

Before using ZeroTrace, you need to configure the following API keys:

- **Google Search API Key**: This key allows ZeroTrace to access Google’s powerful search capabilities. It’s required for making search requests to Google.

- **Custom Search Engine ID**: This ID identifies the specific Google Custom Search Engine you’ll be using. It helps tailor the search results to specific sites or content types based on your configuration.

- **Groq API Key**: This key is used to access Groq's AI capabilities, specifically for generating optimized Google Dorks. Groq leverages the **Llama** Large Language Model (LLM) developed by Meta, which assists in converting your search queries into effective dorks.

## πŸ“‚ **Output Formats**

ZeroTrace provides flexibility in how you view and utilize search results, offering multiple output formats:

- **Console Display** πŸ–₯️: Search results are presented directly in the console for immediate viewing and analysis.
- **HTML Report** πŸ“: Nicely formatted, easy-to-read report suitable for sharing or documentation.
- **JSON Export** πŸ—‚οΈ: Structured data format for further processing or analysis, allowing for integration with other tools or systems.

## πŸ€– **AI Integration**

ZeroTrace uses **Generative AI** via **open-source models** like **Llama3** to generate high-quality, optimized Google Dorks based on natural language input. This feature allows you to easily convert descriptions into actionable Google Dorks, speeding up the reconnaissance process.

## 🎯 Usage Examples

Here are some examples of how to use **ZeroTrace** from the command line:

* Basic Google Dork Search:

Run a Google dork search to find SQL files related to MySQL dumps:

```python
python zerotrace_cli.py -d "filetype:sql \"MySQL dump\" (pass|password|passwd|pwd)" --pages 2 --json results.json --html report.html
```
This command searches for SQL files and exports the results in both JSON and HTML formats.

* AI-Generated Dork Query:

Automatically generate a Google Dork based on a description and retrieve results:

```python
python zerotrace_cli.py -q "Find text files that contain usernames and passwords." --start-page 1 --pages 3 --json output.json --html output.html
```

This command generates a dork based on the input description and retrieves results from the first three pages.

* Download Specific File Types:

Search for and download only PDF and DOC files:
```python
python zerotrace_cli.py -d "filetype:pdf OR filetype:doc \"confidential\"" --download-file-extensions "pdf,doc" --download-folder "my_downloads" --json results.json --html report.html
```
This command searches for both PDF and DOC files containing the term "confidential" and saves them in the "my_downloads" folder.

* Download All File Types

If you want to download all file types found in the search, you can specify "all":

```python
python zerotrace_cli.py -q "site:example.com" --download-file-extensions "all" --download-folder "downloads" --pages 5 --json output.json --html report.html
```
This command retrieves results from the first five pages for the site "example.com" and downloads all file types into the "downloads" folder.

* Configure API Credentials

If you need to set up or update your API credentials, use the configure flag:

```python
python zerotrace_cli.py --configure
```
This command will guide you through configuring your Google API key and Custom Search Engine ID in the .env file.

## βš™οΈ CLI Arguments

| Argument | Description |
|---------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------|
| `-d`, `--dork` | Specify the Google Dork or search query. |
| `-q`, `--query-dork` | Automatically generates a Google Dork based on a description using AI. |
| `-c`, `--configure` | Configure or update the `.env` file with API credentials. |
| `--start-page` | The starting page number for search results (default: 1). |
| `--pages` | The number of pages to retrieve (default: 1). |
| `--lang` | Language code for search results (default: `lang_es` for Spanish). |
| `--json` | Export results to the specified file in JSON format. |
| `--html` | Export results to the specified file in HTML format. |
| `--download-file-extensions` | Specify file extensions to download, separated by commas. Use `'all'` to download all file types. |
| `--download-folder` | Specify the folder where downloaded files will be saved. Use a custom folder name to save files in a specific directory. |

## πŸš€ Using ZeroTrace: A Practical Example

Below is a practical example of how to use ZeroTrace to perform an advanced search and download relevant files.
Suppose you want to search for text files containing lists of usernames and passwords. You can execute the following command in the command line:

```python
python zerotrace_cli.py -q "List of users and passwords in text file contents." --pages 2 --download-file-extensions "txt" --download-folder "downloads" --json output.json --html output.html
```

### Process Breakdown
When executing the above command, ZeroTrace follows these steps:

* Initialization:

ZeroTrace initializes with the Google API key and search engine ID, also configuring the download folder and the file types to download.

```python
2024-09-27 20:07:23,203 - INFO - πŸ” ZeroTrace initialized with Google API key and search engine ID.
2024-09-27 20:07:23,203 - INFO - πŸ“ Download folder set to: downloads
2024-09-27 20:07:23,203 - INFO - πŸ“₯ File extensions to download: all
```

* Dork Generation:

A Google Dork is generated based on the provided description using an AI model.

```python
2024-09-27 20:07:23,204 - INFO - πŸ“ Generating Google Dork for description: List of users and passwords in text file contents.
2024-09-27 20:07:27,030 - INFO - βœ… Generated Dork: filetype:txt ("username password" | "user pass" | "login credentials" | "password list")
```

* Search Execution:

The search is executed using the generated Dork, and the obtained results are processed.

```python
2024-09-27 20:07:28,587 - INFO - βœ… Search completed. Processing 13 results.
```

* Results Export:

The results are exported in HTML and JSON formats for documentation and further analysis.

```python
2024-09-27 20:07:28,663 - INFO - πŸ“„ Exporting results to HTML: output.html
Results exported to HTML. File created: output.html
2024-09-27 20:07:28,671 - INFO - πŸ“Š Exporting results to JSON: output.json
Results exported to JSON. File created: output.json
```

* File Download:

Files that match the search criteria are automatically downloaded and stored in the specified folder.

```python
2024-09-27 20:07:45,016 - INFO - πŸ“₯ Downloading files with types: all
File 'Readme_Baltic%20Sea%20Surface%20Salinity%20L3%20maps.txt' downloaded to 'downloads\Readme_Baltic%20Sea%20Surface%20Salinity%20L3%20maps.txt'.
...
```

* Results
Upon completion, you will receive confirmation that the results have been processed successfully, along with the downloaded files in the specified folder:

```python
2024-09-27 20:07:45,016 - INFO - βœ… Results processed successfully.
```
This example illustrates the power of ZeroTrace in automating the search and collection of sensitive information, thus optimizing the research process for cybersecurity professionals.

## πŸ” **Ethical Use**

This tool is meant for **ethical hacking** and **cybersecurity research** purposes. Ensure that you have proper authorization before using ZeroTrace for any reconnaissance activities. Unauthorized use to access or download sensitive data may be illegal in your jurisdiction.

## 🎯 **Future Improvements**

- πŸ› οΈ **Additional AI Models**: Expanding support for more LLMs.
- βš™οΈ **Custom Search Engines**: Adding support for more search engines beyond Google.
- πŸ“Š **Advanced Reporting**: More detailed and customizable reports.

## 🀝 **Contributing**
Contributions to ZeroTrace are highly encouraged! If you're interested in adding new features, resolving bugs, or enhancing the project's functionality, please feel free to submit pull requests.

## Get in Touch πŸ“¬

ZeroTrace is developed and maintained by **Sergio SΓ‘nchez SΓ‘nchez** (Dream Software). Special thanks to the open-source community and the contributors who have made this project possible. If you have any questions, feedback, or suggestions, feel free to reach out at [[email protected]](mailto:[email protected]).

## Visitors Count

## Please Share & Star the repository to keep me motivated.


## License βš–οΈ

This project is licensed under the MIT License, an open-source software license that allows developers to freely use, copy, modify, and distribute the software. πŸ› οΈ This includes use in both personal and commercial projects, with the only requirement being that the original copyright notice is retained. πŸ“„

Please note the following limitations:

- The software is provided "as is", without any warranties, express or implied. πŸš«πŸ›‘οΈ
- If you distribute the software, whether in original or modified form, you must include the original copyright notice and license. πŸ“‘
- The license allows for commercial use, but you cannot claim ownership over the software itself. 🏷️

The goal of this license is to maximize freedom for developers while maintaining recognition for the original creators.

```
MIT License

Copyright (c) 2024 Dream software - Sergio SΓ‘nchez

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
```