{
"info": {
"author": "Christian Martorella",
"author_email": "cmartorella@edge-security.com",
"bugtrack_url": null,
"classifiers": [
"License :: OSI Approved :: GNU General Public License v2 (GPLv2)",
"Operating System :: OS Independent",
"Programming Language :: Python :: 3"
],
"description": "```\n*******************************************************************\n* *\n* | |_| |__ ___ /\\ /\\__ _ _ ____ _____ ___| |_ ___ _ __ *\n* | __| '_ \\ / _ \\ / /_/ / _` | '__\\ \\ / / _ \\/ __| __/ _ \\ '__| *\n* | |_| | | | __/ / __ / (_| | | \\ V / __/\\__ \\ || __/ | *\n* \\__|_| |_|\\___| \\/ /_/ \\__,_|_| \\_/ \\___||___/\\__\\___|_| *\n* *\n* theHarvester 3.0.6 v260 *\n* Coded by Christian Martorella *\n* Edge-Security Research *\n* cmartorella@edge-security.com *\n*******************************************************************\n```\n\nWhat is this?\n-------------\ntheHarvester is a very simple, yet effective tool designed to be used in the early
\nstages of a penetration test. Use it for open source intelligence gathering and helping
\nto determine a company's external threat landscape on the internet. The tool gathers
\nemails, names, subdomains, IPs, and URLs using multiple public data sources that include:\n\nPassive:\n--------\n* baidu: Baidu search engine\n\n* bing: Microsoft search engine - www.bing.com\n\n* bingapi: Microsoft search engine, through the API (Requires API key, see below.)\n\n* censys: Censys.io search engine\n\n* crtsh: Comodo Certificate search - www.crt.sh\n\n* cymon: Cymon.io search engine\n\n* dogpile: Dogpile search engine - www.dogpile.com\n\n* duckduckgo: DuckDuckGo search engine - www.duckduckgo.com \n\n* google: Google search engine (Optional Google dorking.) - www.google.com\n\n* googleCSE: Google custom search engine\n\n* google-certificates: Google Certificate Transparency report\n\n* hunter: Hunter search engine (Requires API key, see below.) - www.hunter.io\n\n* intelx: Intelx search engine (Requires API key, see below.) - www.intelx.io\n\n* linkedin: Google search engine, specific search for Linkedin users\n\n* netcraft: Netcraft Data Mining\n\n* pgp: PGP key server - mit.edu\n\n* securityTrails: Security Trails search engine, the world's largest repository
\n of historical DNS data (Requires API key, see below.) - www.securitytrails.com\n\n* shodan: Shodan search engine, will search for ports and banners from discovered
\n hosts - www.shodanhq.com\n\n* threatcrowd: Open source threat intelligence - www.threatcrowd.org\n\n* trello: Search trello boards (Uses Google search.)\n\n* twitter: Twitter accounts related to a specific domain (Uses Google search.)\n\n* vhost: Bing virtual hosts search\n\n* virustotal: Virustotal.com domain search \n\n* yahoo: Yahoo search engine\n\n* all: currently a subset of all the most effective plugins\n\nActive:\n-------\n* DNS brute force: dictionary brute force enumeration\n* DNS reverse lookup: reverse lookup of IP\u00b4s discovered in order to find hostnames\n* DNS TDL expansion: TLD dictionary brute force enumeration\n\nModules that require an API key:\n--------------------------------\nAdd your keys to api-keys.yaml\n\n* googleCSE: API key and CSE ID\n* hunter: API key\n* intelx: API key\n* securityTrails: API key\n* shodan: API key\n\nDependencies:\n-------------\n* Python 3.6\n* python3 -m pip install -r requirements.txt\n\nChangelog in 3.0:\n-----------------\n* Subdomain takeover checks.\n* Port scanning (basic).\n* Improved DNS dictionary.\n* Shodan DB search fixed.\n* Result storage in Sqlite.\n\nComments, bugs, or requests?\n----------------------------\ncmartorella@edge-security.com\n\nMain contributors:\n------------------\n* Matthew Brown @NotoriousRebel\n* Janos Zold @Jzold\n* Lee Baird @discoverscripts [](https://twitter.com/discoverscripts)\n* Jay Townsend @L1ghtn1ng [](https://twitter.com/jay_townsend1)\n\nThanks:\n-------\n* John Matherly - Shodan project\n* Ahmed Aboul Ela - subdomain names dictionaries (big and small)\n\n\n",
"description_content_type": "text/markdown",
"docs_url": null,
"download_url": "",
"downloads": {
"last_day": -1,
"last_month": -1,
"last_week": -1
},
"home_page": "https://github.com/laramies/theHarvester",
"keywords": "",
"license": "",
"maintainer": "",
"maintainer_email": "",
"name": "theHarvester",
"package_url": "https://pypi.org/project/theHarvester/",
"platform": "",
"project_url": "https://pypi.org/project/theHarvester/",
"project_urls": {
"Homepage": "https://github.com/laramies/theHarvester"
},
"release_url": "https://pypi.org/project/theHarvester/0.0.1/",
"requires_dist": null,
"requires_python": "",
"summary": "theHarvester is a very simple, yet effective tool designed to be used in the early stages of a penetration test",
"version": "0.0.1"
},
"last_serial": 4777984,
"releases": {
"0.0.1": [
{
"comment_text": "",
"digests": {
"md5": "677df10d490464c1e22bce64848d45df",
"sha256": "5c3b402f5cb56f3f0ce59997b45e492b2b11b3b8b99d98cf0b7ca32199920082"
},
"downloads": -1,
"filename": "theHarvester-0.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "677df10d490464c1e22bce64848d45df",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 97495,
"upload_time": "2019-02-04T14:51:34",
"url": "https://files.pythonhosted.org/packages/9e/e9/fedb3db98e9ed0627f37596a0deddc4b0a41d3acde7009e8d03de65e771a/theHarvester-0.0.1-py3-none-any.whl"
}
]
},
"urls": [
{
"comment_text": "",
"digests": {
"md5": "677df10d490464c1e22bce64848d45df",
"sha256": "5c3b402f5cb56f3f0ce59997b45e492b2b11b3b8b99d98cf0b7ca32199920082"
},
"downloads": -1,
"filename": "theHarvester-0.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "677df10d490464c1e22bce64848d45df",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 97495,
"upload_time": "2019-02-04T14:51:34",
"url": "https://files.pythonhosted.org/packages/9e/e9/fedb3db98e9ed0627f37596a0deddc4b0a41d3acde7009e8d03de65e771a/theHarvester-0.0.1-py3-none-any.whl"
}
]
}