OWASP D4N155 is an intelligent and dynamic wordlist using OSINT. It’s an information security audit tool that creates intelligent wordlists based on the content of the target page.
Install
Need to: Python3.6, Bash (GNU Bourne-Again SHell)
Optional: Git, Groff
git clone https://github.com/owasp/D4N155.git
 cd D4N155
 pip3 install -r requirements.txt
 bash main
Or without git
wget -qO- https://github.com/owasp/D4N155/archive/master.zip | bsdtar -xf-
 cd D4N155-master
 pip3 install -r requirements.txt
 bash main
Also Read – CVE-API : Unofficial API for CVE.MITRE.ORG
Docker
In image:
FROM docker.pkg.github.com/owasp/d4n155/d4n155:latest
Cli:
docker pull docker.pkg.github.com/owasp/d4n155/d4n155:latest
 docker run -it d4n155
Manual
D4N155: Tool for smart audit security
Usage: bash main  
All options are optionals
Options:
-w, –wordlist      Make the smartwordlist based in information
                     on website.
-t, –targets         Make the smart-wordlist based in your passed
                     source informations in urls.
-b, –based       Analyze texts to generate the
                     custom wordlist
-r, –rate        Defines time interval between requests
-o, –output          For to store the all wordlist.
-?a, –aggressive      Aggressive reading with headless
-h, –help          Show this mensage.
Value: 
URL             URL target, example: scanme.nmap.org
IP              IP address
TIME                Time, example: 2.5. I.e: 00:00:02:30.. 0 are default
FILE                File, for save the result, get urls or using in
                     wordlist
	









