Third Party, Passive and Quite reconnaissance tool.
Clone into the repository
git clone https://github.com/idanbuller/bullrecon.git
Use the requirements.txt file to install all python packages needed:
pip3 install -r requirements.txt
After setting all the things up, you may run bullrecon:
python3 main.py
Enter STRING / DOMAIN NAME: XXX.co.il
Who is it?
==================================
Domain: XXX.co.il
Update time: None
Expiration time: N/A
Name server: ['Ns1.XXX.co.il', 'Ns2.XXX.co.il']
Email: [email protected]
Web Technologis
==================================
web-servers: IIS
operating-systems: Windows Server
javascript-frameworks: AngularJS, Modernizr, jQuery, jQuery UI
tag-managers: Google Tag Manager
web-frameworks: Microsoft ASP.NET, Twitter Bootstrap
Robots.txt
==================================
User-agent: *
Disallow: /WebResource.axd
Disallow: /PageFiles/
Disallow: /Global/
Disallow: /Documents/
Disallow: /SaoPaulo/
Disallow: /YKM/
Disallow: /Services/
Disallow: /RssFeeds/
Disallow: /OrangeServices/
Disallow: /24241.html
Disallow: /globalassets/global/plans-new/
Disallow: /globalassets/global/elbitsystems/elbit_pdf/
Disallow: /oldurls/
Disallow: %2AsessionGUID
Leaked Mails
==================================
User-agent: *
Disallow: /WebResource.axd
Disallow: /PageFiles/
Disallow: /Global/
Disallow: /Documents/
Disallow: /SaoPaulo/
Disallow: /YKM/
Disallow: /Services/
Disallow: /RssFeeds/
Disallow: /OrangeServices/
Disallow: /24241.html
Disallow: /globalassets/global/plans-new/
Disallow: /globalassets/global/elbitsystems/elbit_pdf/
Disallow: /oldurls/
Disallow: %2AsessionGUID
Malicious Files
==================================
('ea53363ef562b98db49b6ca766ed94384360da496add226a38e3aec25a5748a9', ' 1/72')
Pastebin
==================================
https://pastebin.com/G3S8c6aY
https://pastebin.com/RkHnaGj7
https://pastebin.com/N1AQaif2
https://pastebin.com/FGHUs19C
https://pastebin.com/PcJA1D6s
Github
==================================
https://github.com/MerlinRdev/softcenter/blob/master/shadowsocks/shadowsocks/bin/XXX.dat
https://github.com/bsspirit/domain/blob/master/metadata/data/900000/XXX.txt
Linkedin
==================================
people/linkedin Module running...
Choose the correct company:
1 XXX Group
2 XXXStack
3 XXXRe
>>