TheHarvester best tool for gathering informations of emails ip address and urls by Termux

TheHarvester
theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early statges of a
penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a
company’s external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using
multiple public data sources.

Installation Linux:

$ apt install snapd && snap install docker
$ git clone https://github.com/laramies/theHarvester
$ cd theHarvester
$ docker build -t theharvester .
$ docker run theharvester -h

Installation In Termux:

$ git clone https://github.com/laramies/theHarvester
$ cd theHarvester
$ python3 -m pip install pipenv
$ pipenv shell
$ python3 theHarvster.py -h

Option 3 is:

$ git clone https://github.com/laramies/theHarvester
$ cd theHarvester
$ python3 -m pip install -r requirements/dev.txt
$ python3 -m pip install -r requirements/base.txt
$ python3 theHarvester.py -h 

Errors:
uvwheel:

$ apt install python3-dev -y
$ pip3 install wheel uvloop
$ python3 -m pip install -r requirements/base.txt
$ pip3 install ipywidgets

The file “api-keys.yml” is for API keys.
It requires following:

– bing
– github
– hunter
– intelx
– securityTrails
– shodan
– spyse

If you want you can add it, or not.

Usage:

$ python3 theHarvester.py -d microsoft.com -l 10 -b google

Thank you for reading! Try these out too:

.MAKE A VIRUS FOR ANY ANDROID IN TERMUX

.HACK WHATSAPP BY OTP VERIFICATION CODE IN TERMUX

SHARE THIS WITH YOUR FRIENDS.

FOLLOW US FOR MORE…

Leave a Reply

Your email address will not be published. Required fields are marked *