Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zaeem20/webeye
Webeye is a Powerful package for making ethical hacking tools easier
https://github.com/zaeem20/webeye
api cloudflare cryptography dns encryption-decryption hacking hash honeypot nmap osint portscanner python sql webeye whois whois-lookup
Last synced: about 2 months ago
JSON representation
Webeye is a Powerful package for making ethical hacking tools easier
- Host: GitHub
- URL: https://github.com/zaeem20/webeye
- Owner: Zaeem20
- License: mit
- Created: 2021-06-23T15:30:25.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2022-05-18T09:23:13.000Z (over 2 years ago)
- Last Synced: 2024-08-09T06:11:19.140Z (5 months ago)
- Topics: api, cloudflare, cryptography, dns, encryption-decryption, hacking, hash, honeypot, nmap, osint, portscanner, python, sql, webeye, whois, whois-lookup
- Language: Python
- Homepage: https://webeye.deta.dev
- Size: 140 KB
- Stars: 11
- Watchers: 2
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
# Webeye
A Powerful Library for making ethical-hacking/pen-testing tools
At your Fingertips, just in 3-5 lines of code...## Features
• Subdomain Enumerator
• Port scanner
• ReverseDNS Lookup
• ReversIP Lookup
• Banner Grabber
• Firewall Detector
• Honeypot Detector (Based on Honeyscore)
• Pagelinks Extractor
• Shared DNS Scanner
• DNS Lookup
• Whois Lookup
• Geo-IP Lookup
• SiteDown detector
• ROT encoder & decoder from (ROT-1 - ROT-25)## Installation
```sh
pip install -U webeye
```
## Getting Started
```py
# importing
from webeye import *
# host
host="google.com"
# schema
schema="https://"
# subdomains
subdomains=subenum(host=host)
# dns lookup
dns=fetch_dns(host=host)
# banner grabber
grabbed=grab(host=host,schema=schema)
# check for ports
ports=scan(host=host, port=1025, start=0, dev_mode = False)
# cloudflare
detected=enumerate_waf(host=host)
# honeypot
honeypot=is_honeypot(host=host)```
## Custom Things
You can also scan specific ports, Iterable type args can also be added...```py
webeye.scan('google.com', [21,80,443])```
You can get IP address of subdomain too...
```py
print(webeye.subenum(target, no_ip=False))```
## Webeye as Asynchronous```py
from webeye import AsyncHelperasyncmanner = AsyncHelper()
async def portscan(target):
await asyncmanner.scan(target, 1024)async def reversedns(target):
await asyncmanner.reversedns(target)async def whois(target):
await asyncmanner.whois(target)async def extract_pagelink(target):
await asyncmanner.extract_pagelink(target)async def shared_dns(target):
await asyncmanner.fetch_shared_dns(target)async def bannergrabber(target):
await asyncmanner.grab(target)async def geoip(target):
await asyncmanner.geoip(target)async def find_subdomains(target):
await asyncmanner.find_subdomains(target)async def dnslook(target):
await asyncmanner.fetch_dns(target)async def reversiplook(target):
await asyncmanner.reverseip(target)async def enumeratefirewall(target):
await asyncmanner.enumerate_firewall(target)async def is_honeypot(target):
await asyncmanner.is_honeypot(target)```
## Webeye as CLI
![image](https://user-images.githubusercontent.com/60778335/137212470-c0326195-5fc5-4112-8587-1dbb09e3c0b9.png)
## Support
• **[Discord](https://discord.gg/xmu36SbCXC)**