A Powerful Library for making ethical-hacking/pen-testing tools
At your Fingertips, just in 3-5 lines of code...
• Subdomain Enumerator
• Port scanner
• ReverseDNS Lookup
• ReversIP Lookup
• Banner Grabber
• Firewall Detector
• Honeypot Detector (Based on Honeyscore)
• Pagelinks Extractor
• Shared DNS Scanner
• DNS Lookup
• Whois Lookup
• Geo-IP Lookup
• SiteDown detector
• ROT encoder & decoder from (ROT-1 - ROT-25)
pip install -U webeye
# importing
from webeye import *
# host
host="google.com"
# schema
schema="https://"
# subdomains
subdomains=subenum(host=host)
# dns lookup
dns=fetch_dns(host=host)
# banner grabber
grabbed=grab(host=host,schema=schema)
# check for ports
ports=scan(host=host, port=1025, start=0, dev_mode = False)
# cloudflare
detected=enumerate_waf(host=host)
# honeypot
honeypot=is_honeypot(host=host)
You can also scan specific ports, Iterable type args can also be added...
webeye.scan('google.com', [21,80,443])
You can get IP address of subdomain too...
print(webeye.subenum(target, no_ip=False))
from webeye import AsyncHelper
asyncmanner = AsyncHelper()
async def portscan(target):
await asyncmanner.scan(target, 1024)
async def reversedns(target):
await asyncmanner.reversedns(target)
async def whois(target):
await asyncmanner.whois(target)
async def extract_pagelink(target):
await asyncmanner.extract_pagelink(target)
async def shared_dns(target):
await asyncmanner.fetch_shared_dns(target)
async def bannergrabber(target):
await asyncmanner.grab(target)
async def geoip(target):
await asyncmanner.geoip(target)
async def find_subdomains(target):
await asyncmanner.find_subdomains(target)
async def dnslook(target):
await asyncmanner.fetch_dns(target)
async def reversiplook(target):
await asyncmanner.reverseip(target)
async def enumeratefirewall(target):
await asyncmanner.enumerate_firewall(target)
async def is_honeypot(target):
await asyncmanner.is_honeypot(target)
• Discord