Categories: Kali Linux

theHarvester – Tool To Gather Email Address, Sub Domain and Hosts

theHarvester Tool” is a simple and effective tool to gather the Email Address, Employee Names, Hostnames, Sub Domains, IP addresses, and Virtual Hosts, from different public sources (eg: Google, LinkedIn)

How do we do it? – theHarvester

git clone https://github.com/laramies/theHarvester.git

Open the directory where the files are cloned to:

Also read Mcreator – Encoded Reverse Shell Generator With Techniques To Bypass AV’s

Run the python file [Use ./ or “python” while executing a python file]

Examples:

Fetch from a domain (-d www.vulnweb.com), limiting the results to 300 (-l 300), using LinkedIn (-b LinkedIn)

Fetch from a domain (-d www.vulnweb.com), limiting the results to 300 (-l 300), using Google (-b google)

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Pricilla

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

17 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

19 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

21 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

21 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

21 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago