Recon Automation for hackers by hackers
Usage: ./EchoPwn.sh [options] -d domain.com Options: -h Display this help message. -k Run Knockpy on the domain. -n Run Nmap on all subdomains found. -a Run Arjun on all subdomains found. -p Run Photon crawler on all subdomains found. -b Run Custom Bruteforcer to find subdoamins.
Target: -d Specify the domain to scan.
Example: ./EchoPwn.sh -d hackerone.com
Output will be saved in EchoPwn/domain.com/ directory
install.shmakes environment to run
EchoPwn.shcreates a directory
EchoPwn/domain_namein current working directory. 1. Subdomain Enumeration - Sublist3r - crt.sh - amass - subfinder - assetfinder - aquatone-discover - findomain - github-subdomains - custom bruteforcer with
subdomains.txtas input file. - Optional: knockpy
Checking for live subdomains
Checking for subdomain takeover
tokens.txtwill be used to notify the user once the script has finished running.
Final list of subdomains will be present in
EchoPwn/domain_namedirectory. Outputs corresponding to the tools will also be present in the same directory.
./install.shSome Tools require manual downloading of pre-built binaries (or build them yourself): 1. Subfinder 2. Assestfinder 3. Aquatone
Download (or build) and place these binaries in the
Apart from the tokens required by individual tools, this script requires 4 additional values: - FaceBook Token - Github Token - Spyse Token - VirusTotal Token - Slack WebHook URL
Place these values in
NOTE 1. If you face Import error (Queue) while running altdns, you have to manually change main.py file mentioned in the error. Do the following change Before:
Import Queue from Queue as QueueAfter:
Import queue from Queue as Queue
Suggestions are welcomed. Mail us at: [email protected]