Skip to content

Latest commit

 

History

History
124 lines (84 loc) · 3.63 KB

README.md

File metadata and controls

124 lines (84 loc) · 3.63 KB

ExplorerPy

ExplorerPy is a recon-toolkit for information-gathering. It is designed to gather information about a domain by performing various tasks such as subdomain enumeration, directory brute-forcing, and port scanning.

Installation

git clone https://github.com/M3hank/ExplorerPy.git
cd ExplorerPy
pip3 install -r requirements.txt

Screenshots

ExplorerPy

Directory Bruteforce Module

BruteForce

Features

  • Subdomain enumeration using either brute-forcing or OSINT (Open Source Intelligence) methods
  • Directory brute-forcing
  • Port scanning
  • Multithreaded execution for faster performance
  • Ability to specify the number of threads to use for scanning
  • Ability to specify a custom wordlist for brute-forcing
  • Ability to specify a timeout for requests
  • Option to output results to a file
  • User-Agent spoofing to mimic a web browser in requests
  • HTTP header spoofing to add accept languages and encoding types to requests

Requirements

ExplorerPy has the following requirements:

  • Python 3.x or higher
  • requests library

Usage/Examples

usage: ExplorerPy [-h] [-d DOMAIN] [-t THREADCOUNT] [-w WORDLIST] [-o OUTPUT_FILE]
                 [-time TIME]
                 [-se] [-osint] [-dir] [-ps] [-p PORTRANGE]

optional arguments:
  -h, --help            show this help message and exit
  -d DOMAIN,  DOMAIN
                        Domain name to scan
  -t THREADCOUNT
                        Number of threads to use for scanning (default: 20)
  -w WORDLIST
                        Wordlist to use for brute-forcing
  -o OUTPUT_FILE
                        Output file to write results to (default: None)
  -time TIME
                        Timeout for requests in seconds (default: 15)

Subdomain-Enumeration Arguments:
  -se        Enable subdomain enumeration module
  -osint      Use OSINT (Open Source Intelligence) methods instead of
                      brute-forcing for subdomain enumeration

Directory-Enumeration Arguments:
  -dir      Enable directory brute-forcing module
  -fc, --filter_code FILTER_CODE
                        Status codes to filter out (comma separated)
  -fs, --filter_size FILTER_SIZE
                        Filter out directories with a response size equal to this value

Port-Scanner Arguments:
  -ps      Enable port scanning module
  -p       Range of ports to scan (default: 1024)
          

Examples

To perform subdomain enumeration using brute-forcing:

python3 ExplorerPy -d example.com -se -w wordlist.txt

To perform subdomain enumeration using OSINT methods:

python3 ExplorerPy -d example.com -se -osint

To perform directory brute-forcing:

python3 ExplorerPy -d example.com -dir -w wordlist.txt

To perform port scanning:

python3 ExplorerPy -d example.com -ps

To perform port scanning with a specific range of ports:

python3 ExplorerPy -d example.com -ps -p 1000

Disclaimer

Disclaimer This script is intended for educational and testing purposes only. It is not intended to be used for malicious purposes, and the authors of this script are not responsible for any misuse or damage caused by this script. Use of this script is at your own risk.

License

GNU General Public License v3.0

Contributors

Contributing

Contributions are always welcome!