Sharingan is a recon multitool for offensive security and bug bounty

(23 views)

Sharingan is a recon multitool for offensive security/bug bounty

This is very much a work in progress and I'm relatively new to offensive security in general so if you see something that can be improved please open an issue or PR with suggested changes.

Cloning for development

Outside of your Gopath git clone https://github.com/leobeosab/sharingan

Installing

go get github.com/leobeosab/sharingan/cmd/sharingancli

Dependencies

  • NMap
  • Go

Usage

Note

Order matters when it comes to flags it must be sharingancli [globalflags] command [commandflags] if this isn't a wanted feature I can change it but I like how clean it is.

DNS

bruteforce

DNS busts the target with a wordlist you provide

sharingancli --target targetname dns --dns-wordlist ~/path/to/wordlist --root-domain target.com 

addsubs

Adds subdomains to the program's storage from stdin using pipes:

cat subs | sharingancli --target targetname dns addsubs

Scan

Scans all hosts available that were stored in target using nmap:

sharingancli --target target scan 

interactive

Scan a single host from the list of subdomains stored in the target:

sharingancli --target target scan interactive 

info

domains

Outputs all domains as a list in stdout

sharingancli --target target info domains  

Features to come

  • Dir brute-forcing -- Currently being worked on
  • JSON and regular file exports
  • Automated scans through a daemon?
  • add a way to do SYN / -sS scanning [ must be root so it presents a challenge ]
  • Possible Web UI / HTML export

More: https://github.com/leobeosab/sharingan

May 19, 2020

Author

Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023