TheHarvester
theHarvester -d countrygarden.com.cn -l 100 -s -b all
-d #DOMAIN
-l LIMIT #Limit the number of search results, default=500
-S START #Start with result number X, default=0.
-g #Use Google Dorks for Google search.
-p #Use proxies for requests, enter proxies in proxies.yaml.
-s #Use Shodan to query discovered hosts.
--screenshot #Take screenshots of resolved domains
-v #Verify host name via DNS resolution and search for virtual hosts.
-e #DNS server to use for lookup.
-t DNS_TLD #Perform a DNS TLD expansion discovery, default False.
-r #Check for takeovers.
-n #Enable DNS server lookup, default False.
-c #Perform a DNS brute force on the domain.
-f #FILENAME Save the results to an XML and JSON file.
-b SOURCE anubis, baidu, bing, binaryedge, bingapi, bufferoverun,
censys, certspotter, crtsh, dnsdumpster, duckduckgo, github-code,
google, hackertarget, hunter, intelx, linkedin, linkedin_links,
netcraft, omnisint, otx, pentesttools, projectdiscovery, qwant,
rapiddns, rocketreach, securityTrails, spyse, sublist3r,
threatcrowd, threatminer, trello, twitter, urlscan, virustotal,
yahoo, zoomeye, all
Last updated