- footprinting target domain (whois, nslookup, ssl cert, ...)
- detect social engineering attacks
- detect potential but dangerous risks
pip install python-whois
pip install dnspython
- create a
domain.txtfile at root directory - run
main.py
python3 main.py
├── dangerous_tld.py
├── detect_potential_risk.py
├── detect_social_engineering_attack.py
├── domain.txt
├── footprinting.py
├── idn_homograph.py
├── main.py
├── mutate_url
│ ├── mutate_url.py
│ ├── mutated_url.txt
│ └── target_url.txt
├── preprocessing.py
├── short_url.py
└── typo_squatting.py
main.py: run total inspection and detectionfootprinting.py: fetch whois, nslookup, ssl cert. output results as JSONdetect_social_engineering_attack.py: detect social engineering attacks. output results as JSONdetect_potential_risk.py: detect potential risks. output results as JSON
dangerous_tld.py: check if domain has dangerous tlddomain.txt: a list of domains for dummy tests inmain.pyidn_homograph.py: detect mixed scriptsmutate_urlmutate_url.py: run mutator and craft typo-squatting greylist urls`
preprocessing.py: extract root domainshort_url.py: detect short_url and expand urltypo_squatting.py: check if domain inmutated_url.txt