Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ Detail information File Reconnaissance & Juicy Data
- subdomain.txt -- Subdomain list < $DOMAIN (Target)
- httprobe_subdomain.txt -- Validate Subdomain < subdomain.txt
- webanalyzes.txt -- Identify technology scan < httprobe_subdomain.txt
- httpx_status_title.txt -- title+statuscode+lenght < httprobe_subdomain.txt
- httpx_status_title.txt -- title+statuscode+length < httprobe_subdomain.txt
- dnsprobe_subdomain.txt -- Subdomain resolv < subdomain.txt
- Subdomain_Resolver.txt -- Subdomain resolv (alt) < subdomain.txt
- cf-ipresolv.txt -- Cloudflare scan < ip_resolver.txt
Expand All @@ -91,7 +91,7 @@ Detail information File Reconnaissance & Juicy Data
- Passive_Collect_URL_Full.txt -- Full All Url Crawl (WebArchive, CommonCrawl, UrlScanIO)
------------------------------------------------------------------------------------------------------

- ./screenshots/report-0.html -- Screenshoting report < httprobe_subdomain.txt
- ./screenshots/report-0.html -- Screenshotting report < httprobe_subdomain.txt
- ./screenshots/gowitness/gowitness.sqlite3 -- Database screenshot < httprobe_subdomain.txt

------------------------------------------------------------------------------------------------------
Expand All @@ -110,7 +110,7 @@ Detail information File Reconnaissance & Juicy Data
- ./takeover/CNAME-resolv.txt -- CNAME Resolver < subdomain.txt
- ./takeover/TakeOver-Lookup.txt -- DNSLookup < CNAME-resolv.txt
- ./takeover/TakeOver-nxdomain.txt -- Other 3d service platform < TakeOver-Lookup.txt
- ./takeover/TakeOver.txt -- Checking Vulnerabilty < CNAME-resolv.txt
- ./takeover/TakeOver.txt -- Checking Vulnerability < CNAME-resolv.txt

------------------------------------------------------------------------------------------------------

Expand Down Expand Up @@ -269,7 +269,7 @@ Optional Arguments:
-aI, --apps-identifier Identify technologies on website (ex: -aI webanalyze)
-dP, --db-port Collecting port from 3rd Party default=shodan
-eP, --extract-params Collecting URL Parameter from Engine
-tO, --takeover Subdomain TakeOver Vulnerabilty Scanner
-tO, --takeover Subdomain TakeOver Vulnerability Scanner
-wS, --websocket WebSocket Connection Check
-cF, --cloudfare Check an IP is Owned by Cloudflare
-pS, --ping-sweep Check live host using methode Ping Sweep
Expand Down Expand Up @@ -320,7 +320,7 @@ HTML Report Sample:
|![Index](https://user-images.githubusercontent.com/17976841/63597336-6ab6e880-c5e7-11e9-819e-91634e347b0c.PNG)|![f](https://user-images.githubusercontent.com/17976841/63597476-bbc6dc80-c5e7-11e9-8985-6a73348a2e02.PNG)|


To gnereate network graph visualization subdomain & virtualhosts
To generate network graph visualization subdomain & virtualhosts
```
$ sudomy -d hackerone.com -rS --graph
```
Expand Down
2 changes: 1 addition & 1 deletion doc/README_ID.md
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ Optional Arguments:
-h, --help show this help message
-o, --html Make report output into HTML
-s, --source Use source for Enumerate Subdomain
-tO, --takeover Subdomain TakeOver Vulnerabilty Scanner
-tO, --takeover Subdomain TakeOver Vulnerability Scanner
-pS, --ping-sweep Check live host using methode Ping Sweep
-rS, --resolver Convert domain lists to resolved IP lists without duplicates
-sC, --status-code Get status codes, response from domain list
Expand Down
2 changes: 1 addition & 1 deletion doc/README_PT_BR.md
Original file line number Diff line number Diff line change
Expand Up @@ -189,7 +189,7 @@ Optional Arguments:
-aI, --apps-identifier Identify technologies on websites from domain list
-dP, --db-port Collecting port from 3rd Party default=shodan
-eP, --extract-params Collecting URL Parameter from Engine
-tO, --takeover Subdomain TakeOver Vulnerabilty Scanner
-tO, --takeover Subdomain TakeOver Vulnerability Scanner
-pS, --ping-sweep Check live host using methode Ping Sweep
-rS, --resolver Convert domain lists to resolved IP lists without duplicates
-sC, --status-code Get status codes, response from domain list
Expand Down
30 changes: 15 additions & 15 deletions sudomy
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ goBanner() {
echo -e ${RED}"\__ \ || / _ ${YELLOW}/ __ \ ${GREEN} ' \ || |${RESET}"
echo -e ${RED}"|___/\_,_\__,_${YELLOW}\____/${GREEN}_|_|_\_, |${RESET}"
echo -e ${RED}" ${YELLOW} ${GREEN} |__/${RESET} v{${RED}${VERSION}${RESET}} by ${GREEN}@screetsec ${RESET}"
echo -e "${YELLOW}Sud⍥my ${RESET}- Fast Subdmain Enumeration and Analyzer ${RESET} "
echo -e "${YELLOW}Sud⍥my ${RESET}- Fast Subdomain Enumeration and Analyzer ${RESET} "
echo -e "\t http://github.com/screetsec/sudomy\n"
}

Expand All @@ -56,10 +56,10 @@ LGREEN="\033[1;32m" # Light GREEN
LBLUE="\033[1;34m" # Light Blue
LPURPLE="\033[1;35m" # Light Purple
LCYAN="\033[1;36m" # Light Cyan
SORANGE="\033[0;33m" # Standar Orange
SBLUE="\033[0;34m" # Standar Blue
SPURPLE="\033[0;35m" # Standar Purple
SCYAN="\033[0;36m" # Standar Cyan
SORANGE="\033[0;33m" # Standard Orange
SBLUE="\033[0;34m" # Standard Blue
SPURPLE="\033[0;35m" # Standard Purple
SCYAN="\033[0;36m" # Standard Cyan
DGRAY="\033[1;30m" # Dark Gray

goHelp() {
Expand All @@ -79,9 +79,9 @@ goHelp() {
echo -e "${PADDING}${BOLD}-aI,${RESET} --apps-identifier Identify technologies on website (ex: -aI webanalyze)"
echo -e "${PADDING}${BOLD}-dP,${RESET} --db-port\t Collecting port from 3rd Party default=shodan"
echo -e "${PADDING}${BOLD}-eP,${RESET} --extract-params\t Collecting URL Parameter from Engine"
echo -e "${PADDING}${BOLD}-tO,${RESET} --takeover\t Subdomain TakeOver Vulnerabilty Scanner"
echo -e "${PADDING}${BOLD}-tO,${RESET} --takeover\t Subdomain TakeOver Vulnerability Scanner"
echo -e "${PADDING}${BOLD}-wS,${RESET} --websocket\t WebSocket Connection Check"
echo -e "${PADDING}${BOLD}-cF,${RESET} --cloudfare\t Check an IP is Owned by Cloudflare"
echo -e "${PADDING}${BOLD}-cF,${RESET} --cloudflare\t Check an IP is Owned by Cloudflare"
echo -e "${PADDING}${BOLD}-pS,${RESET} --ping-sweep\t Check live host using methode Ping Sweep"
echo -e "${PADDING}${BOLD}-rS,${RESET} --resolver\t Convert domain lists to resolved IP lists without duplicates"
echo -e "${PADDING}${BOLD}-sC,${RESET} --status-code\t Get status codes, response from domain list"
Expand Down Expand Up @@ -193,7 +193,7 @@ while [[ "${#}" -gt 0 ]]; do
;;

\
"-cf" | "--cloudfare")
"-cf" | "--cloudflare")
PLUGIN_CFCHECK=true
shift
;;
Expand Down Expand Up @@ -1034,7 +1034,7 @@ if [[ ${PLUGIN_PING_SWEEP} == true ]]; then
fi

# Ddetect virtualhost (several subdomains which resolve to single IP Address
# resolve the collected subdomains to IP addresses, then classify them if several subdomains resolve to single IP addres
# resolve the collected subdomains to IP addresses, then classify them if several subdomains resolve to single IP address
if [[ ${PLUGIN_RESOLV_SD} == true ]]; then

source ${APP_RESOLVER}
Expand Down Expand Up @@ -1069,7 +1069,7 @@ if [[ ${PLUGIN_CFCHECK} == true ]]; then
fi

# Port scanning with top-ports using nmap from domain list
# To run this plugin, rung with argument -cF to check IP Onwed with Cloudfare
# To run this plugin, rung with argument -cF to check IP Owned with Cloudflare
# Before perform Active Scanning
# For Example sudomy -d example.com -cF -nT
if [[ ${PLUGIN_NMAP_PORTS} == true ]]; then
Expand Down Expand Up @@ -1110,14 +1110,14 @@ fi
#Remove Temporary RAW DATA []
#rm -r ${OUT_RAW_WEBARCHIVE} ${OUT_RAW_COMMONCRAWL} ${OUT_RAW_URLSCAN} ${OUT}/${RESULT_EXTRACT_PARAM} > /dev/null 2>&1

# Subdomain TakeOver Vulnerabilty Scanner
# Subdomain TakeOver Vulnerability Scanner
if [[ ${PLUGIN_TAKEOVER} == true ]]; then
source ${APP_TAKEOVER}
exec_takeover
fi

# Identify technology on websites
# Run argument -aI / --apps-identifider ( -aI webanalyze / -aI webanalyze,wappalyzer
# Run argument -aI / --apps-identifier ( -aI webanalyze / -aI webanalyze,wappalyzer
if [[ ${APPS_IDENTIFIER} == true ]]; then
# Default running Apps Identifier (wappalyzer)
if [[ -z ${LIST_API} ]]; then
Expand Down Expand Up @@ -1183,7 +1183,7 @@ fi

# Subdomain, IPAddress & Virtualhost (Make Network Graph Mapping)
# nGraph for Mapping Results
# Run this argument wirh -rS or this argument will rung that argument to perform
# Run this argument with -rS or this argument will rung that argument to perform
if [[ ${PLUGIN_NGRAPH} == true ]]; then
if [[ ${PLUGIN_RESOLV_SD} == true ]]; then
source ${APP_GRAPH}
Expand Down Expand Up @@ -1338,14 +1338,14 @@ for i in $(ls "${OUT}/${DATE_LOG}/${DOMAIN}"); do
done

echo -e "---------------------------------------------\n"
echo -e "If your using the screenshot plugin (gowitness) Remeber to kill the server process when you're done"
echo -e "If your using the screenshot plugin (gowitness) Remember to kill the server process when you're done"
echo -e "ps aux | grep gowitness"
echo -e "kill -9 <PID>"
echo -e "---------------------------------------------\n"


if [[ $DESTINATION == true ]]; then
echo -e "\n${BOLD}[${LGREEN}+${RESET}${BOLD}]${RESET} Sud⍥my has been sucessfully ${GRENN}completed${RESET}"
echo -e "\n${BOLD}[${LGREEN}+${RESET}${BOLD}]${RESET} Sud⍥my has been successfully ${GRENN}completed${RESET}"
echo -e "---------------------------------------------\n"
echo -e "${PADDING}${YELLOW}${PADDING}⍥${PADDING}${RESET}Location output: "
[[ ! -e "${OUTFILE}/${OUT_NAME}" ]] &&
Expand Down