Ashok - A OSINT Recon Tool, A.K.A Swiss Army Knife

AVvXsEhDSZHMyXiZrdj2WfsU7BKHbcVobLbdhFtl74UIPpj6EO_Q4PPtgoLGJmxK_ge5I4o8Ie9e_yRWuoXoMqbgjxOJmknIpLY1mSgsn8Pmv3pQo9oH_s3ttYU35pWf2KVQ_l-uJJ13UG-ORyj-JtootsUju7R9dAbG5-kWJD2ZaGKWF1sEvYYOcHk9ds198M4=w640-h478


Reconnaissance​
is the first phase of penetration testing which means​
gathering
information before any real attacks are planned So Ashok is an Incredible fast recon tool for penetration tester which is specially designed for​
Recon
naissance" title="​
Recon
naissance">​
Recon
naissance phase. And in​
Ashok-v1.1
you can find the​
advanced google dorker
and​
wayback crawling
machine.​

AVvXsEjKiJOBbdxgV_G8UyDxfYHPzftvrZ4Fkemq0v_cBpmpfbSguBZlQZuGzvrTCKa1oXXDHvB_3ydHbbYi8mT69fCL3GmNOqF81g-oWeCpeJkBQ5_46Q7swkF-Z5fzTDq7o1x1hCkT8aVpQlSKikDowUySGfEFfIh5OgBqCVJuWyezLhF3S8x8-bARuDPDTLg=w640-h474

Main Features​

코드:
- Wayback Crawler Machine
- Google Dorking without limits
- Github Information Grabbing
- Subdomain Identifier 
- Cms/Technology Detector With Custom Headers

Installation​

코드:
~> git clone https://github.com/ankitdobhal/Ashok
~> cd Ashok
~> python3.7 -m pip3 install -r requirements.txt

How to use Ashok?​

A detailed usage guide is available on Usage section of the Wiki.
But Some index of options is given below:
  • Extract Http Headers from single url
  • Dump internet-archive machine with json output for single url
  • Google dorking using number of results as dorknumber
  • Dns Lookup of single target domain
  • Subdomain Lookup of single target domain
  • Port Scan using nmap of single target domain
  • Extract data using Github username of target
  • Detect Cms of target url

Docker​

Ashok can be launched using a lightweight Python3.8-Alpine Docker image.
코드:
$ docker pull powerexploit/ashok-v1.2
$ docker container run -it powerexploit/ashok-v1.2  --help
AVvXsEhDSZHMyXiZrdj2WfsU7BKHbcVobLbdhFtl74UIPpj6EO_Q4PPtgoLGJmxK_ge5I4o8Ie9e_yRWuoXoMqbgjxOJmknIpLY1mSgsn8Pmv3pQo9oH_s3ttYU35pWf2KVQ_l-uJJ13UG-ORyj-JtootsUju7R9dAbG5-kWJD2ZaGKWF1sEvYYOcHk9ds198M4=w640-h478

Credits​

  • hackertarget
 
뒤로
상단