- footprinting target domain (whois, nslookup, ssl cert, ...)
- detect social engineering attacks
- detect potential but dangerous risks
pip install python-whois
pip install dnspython
- create a
domain.txt
file at root directory - run
main.py
python3 main.py
├── dangerous_tld.py
├── detect_potential_risk.py
├── detect_social_engineering_attack.py
├── domain.txt
├── footprinting.py
├── idn_homograph.py
├── main.py
├── mutate_url
│ ├── mutate_url.py
│ ├── mutated_url.txt
│ └── target_url.txt
├── preprocessing.py
├── short_url.py
└── typo_squatting.py
main.py
: run total inspection and detectionfootprinting.py
: fetch whois, nslookup, ssl cert. output results as JSONdetect_social_engineering_attack.py
: detect social engineering attacks. output results as JSONdetect_potential_risk.py
: detect potential risks. output results as JSON
dangerous_tld.py
: check if domain has dangerous tlddomain.txt
: a list of domains for dummy tests inmain.py
idn_homograph.py
: detect mixed scriptsmutate_url
mutate_url.py
: run mutator and craft typo-squatting greylist urls`
preprocessing.py
: extract root domainshort_url.py
: detect short_url and expand urltypo_squatting.py
: check if domain inmutated_url.txt