TheHarvester Optionen
Zur Navigation springen
Zur Suche springen
API Keys
- Manche Abfragen verlagen eine Authorisierung, hier kommen die API Keys rein
- /etc/theHarvester/api-keys.yaml
apikeys:
bing:
key:
censys:
id:
secret:
github:
key:
hunter:
key:
intelx:
key:
pentestTools:
key:
projectDiscovery:
key:
securityTrails:
key:
shodan:
key:
spyse:
key:
theHarvester is used to gather open source intelligence (OSINT) on a company or domain.
- optional arguments
- -h, --help
show this help message and exit
- -d DOMAIN, --domain DOMAIN
Company name or domain to search.
- -l LIMIT, --limit LIMIT
Limit the number of search results, default=500.
- -S START, --start START
Start with result number X, default=0.
- -g, --google-dork
Use Google Dorks for Google search.
- -p, --proxies
Use proxies for requests, enter proxies in proxies.yaml.
- -s, --shodan
Use Shodan to query discovered hosts.
- --screenshot SCREENSHOT
Take screenshots of resolved domains specify output directory: --screenshot output_directory
- -v, --virtual-host
Verify host name via DNS resolution and search for virtual hosts.
- -e DNS_SERVER, --dns-server DNS_SERVER
DNS server to use for lookup.
- -t DNS_TLD, --dns-tld DNS_TLD
Perform a DNS TLD expansion discovery, default False.
- -r, --take-over
Check for takeovers.
- -n, --dns-lookup
Enable DNS server lookup, default False.
- -c, --dns-brute
Perform a DNS brute force on the domain.
-f FILENAME, --filename FILENAME
Save the results to an HTML and/or XML file.
-b SOURCE, --source SOURCE
baidu, bing, bingapi, bufferoverun, censys, certspotter, crtsh, dnsdumpster, duckduckgo, exalead, github-code, google, hackertarget, hunter, intelx, linkedin, linkedin_links, netcraft, omnisint, otx, pentesttools, projectdiscovery, qwant, rapiddns, securityTrails, spyse, sublist3r, threatcrowd, threatminer, trello, twitter, urlscan, virustotal, yahoo