Sunday, April 19, 2020

CertCrunchy - Just A Silly Recon Tool That Uses Data From SSL Certificates To Find Potential Host Names


It just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/, and https://censys.io or given an IP range it will attempt to extract host information from SSL Certificates. If you want to use Censys.io you need to register for an API key.

How to install
git clone https://github.com/joda32/CertCrunchy.git
cd CertCrunchy
sudo pip3 install -r requirements.txt

How to use it?
Very simply -d to get hostnames for a specific domain
-D to get hostnames for a list of domains (just stuff it in a line-delimited text file)
-I to retrieve and parse certificates from hosts in a netblock / IP range (e.g. 192.168.0.0/24)
-T the thread count makes stuff faster, but don't over do it
-o Output file name
-f Output format CSV or JSON, CSV is the default
for the rest, I'm still working on those :)

API keys and configs
All API keys are stored in the api_keys.py file below is a list of supported APIs requiring API keys.
  1. Censys.oi https://censys.io
  2. VirusTotal https://www.virustotal.com/en/documentation/public-api/

Related news


  1. How To Make Hacking Tools
  2. Hacking Tools Pc
  3. Hacker Tools For Ios
  4. Hack Tool Apk
  5. Hack Tools For Mac
  6. Hacking Tools For Games
  7. Free Pentest Tools For Windows
  8. Hack Apps
  9. Hacker Tools Software
  10. Pentest Tools Port Scanner
  11. Kik Hack Tools
  12. Hacker Techniques Tools And Incident Handling
  13. Best Pentesting Tools 2018
  14. Nsa Hacker Tools
  15. Hacking Tools Github
  16. New Hacker Tools
  17. Hacker Tools Github
  18. Hacking Tools Free Download
  19. Hacking Tools For Windows Free Download
  20. Pentest Tools Windows
  21. Hacking Tools Mac
  22. Pentest Automation Tools
  23. Hacking Tools Windows 10
  24. Hacker Tools Windows
  25. Game Hacking
  26. Pentest Tools Review
  27. Pentest Tools For Android
  28. Hacker Tools List

No comments: