Welcome to the S1N6H-Recon

Description Basic Recon tool for beginners. Especially those who faces issue on how to recon or what all tools to use. Will try to add atleast 10 more tools currently use 7 sources to gather domains.Currenlty uses below mentioned tools and also sort live domains using HttpX.

How to use

Please setup tools listed before using the script

git clone https://github.com/S1N6H/S1N6H-Recon

chmod +x S1N6H.sh

./S1N6H.sh example.com

Issue Add path for subbrute. If it takes long remove amass.

Tools used

  1. Findomain (https://github.com/Findomain/Findomain)
  2. Subfinder (https://github.com/projectdiscovery/subfinder)
  3. Assetfinder (https://github.com/tomnomnom/assetfinder)
  4. Amass (https://github.com/OWASP/Amass)
  5. Sublist3r (https://github.com/aboul3la/Sublist3r)
  6. Gau (GO111MODULE=on go get -u -v github.com/lc/gau)
  7. Subbrute (https://github.com/TheRook/subbrute)
  8. HttpX (https://github.com/projectdiscovery/httpx)

Thanks to Mayur (https://www.linkedin.com/in/th3cyb3rc0p/) and Hemant (https://www.linkedin.com/in/hemantsolo/)

Who am I

Hi, I am Harinder Singh. I am a part time bug bounty hunter or you can say Cyber Security Researcher. I am currently acknowledged by 93+ Companies including Google ,Blackberry ,Redhat ,Philips and many more. You can find more about me at https://www.linkedin.com/in/lambardar

Need help ping me at https://www.instagram.com/bug.bounty.meme

GitHub

https://github.com/S1N6H/S1N6H-Recon