{"id":10634,"date":"2020-05-26T21:09:51","date_gmt":"2020-05-26T15:39:51","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10634"},"modified":"2020-05-26T21:09:51","modified_gmt":"2020-05-26T15:39:51","slug":"sharingan","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/sharingan\/","title":{"rendered":"Sharingan : Offensive Security Recon Tool"},"content":{"rendered":"\n<p><strong>Sharingan <\/strong>is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I&#8217;m relatively new to offensive security in general so if you see something that can be improved please open an issue or PR with suggested changes.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Cloning for development<\/strong><\/p>\n\n\n\n<p>Outside of your gopath <\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/leobeosab\/sharingan<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installing<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>go get github.com\/leobeosab\/sharingan\/cmd\/sharingancli<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/threadtear\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threadtear : Multifunctional Java Seobfuscation Tool Suite<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Dependencies<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>NMap<\/li><li>Go<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-background has-luminous-vivid-amber-background-color\"><strong>Note :<\/strong> Order matters when it comes to flags it must be <code><strong>sharingancli [globalflags] command [commandflags]<\/strong><\/code> if this isn&#8217;t a wanted feature I can change it but I like how clean it is<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>DNS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/github.com\/leobeosab\/sharingan#bruteforce\"><\/a>bruteforce<\/li><\/ul>\n\n\n\n<p>DNS busts the target with a wordlist you provide<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>sharingancli &#8211;target targetname dns &#8211;dns-wordlist ~\/path\/to\/wordlist &#8211;root-domain target.com <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/--S8uZFmbRuY\/XsTX6Y4XZvI\/AAAAAAAAGYs\/ae7plfDGL44nONuZq4KryRECAIbm_xerACLcBGAsYHQ\/s1600\/bruteforce.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>addsubs<\/strong><\/li><\/ul>\n\n\n\n<p>Adds subdomains to the program&#8217;s storage from stdin using pipes<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cat subs | sharingancli &#8211;target targetname dns addsubs <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Scan<\/strong><\/li><\/ul>\n\n\n\n<p>Scans all hosts available that were stored in target using nmap<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>sharingancli &#8211;target target scan<\/strong> <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-bWJ_pMHq4Fk\/XsTX6jr7DnI\/AAAAAAAAGY0\/an4TYn87bRkH9xEQS9IDcFmThljgrO3IgCLcBGAsYHQ\/s1600\/info.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>interactive<\/strong><\/li><\/ul>\n\n\n\n<p>Scan a single host from list of subdomains stored in target<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>sharingancli &#8211;target target scan interactive <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-fTz18szKAXY\/XsTX7WGK_-I\/AAAAAAAAGY4\/IgMFdllfm4AkKuQsZShY642zUkBUKbAowCLcBGAsYHQ\/s1600\/interactive.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>info<\/strong><ul><li><strong>domains<\/strong><\/li><\/ul><\/li><\/ul>\n\n\n\n<p>Outputs all domains as a list in stdout<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">sharingancli &#8211;target target info domains+<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-amt3WJpHbRg\/XsTX6V-0nuI\/AAAAAAAAGYw\/3lNIYSK9Vso_aKUo6Ijjyg9_UaO0VXZ6wCLcBGAsYHQ\/s1600\/Scan.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features To Come<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Dir brute forcing &#8212; Currently being worked on<\/li><li>JSON and regular file exports<\/li><li>Automated scans through a daemon?<\/li><li>add a way to do SYN \/ -sS scanning [ must be root so it presents a challenge ]<\/li><li>Possible Web ui \/ html export<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/leobeosab\/sharingan\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I&#8217;m relatively new to offensive security in general so if you see something that can be improved please open an issue or PR with suggested changes. Cloning for development Outside of your gopath git clone [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","fifu_image_alt":"Sharingan : Offensive Security Recon Tool","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[3020,3057],"class_list":["post-10634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-security-recon","tag-sharingan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sharingan : Offensive Security Recon Tool!Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I&#039;m relatively new to offensive security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/sharingan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sharingan : Offensive Security Recon Tool!Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I&#039;m relatively new to offensive security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/sharingan\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T15:39:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Sharingan : Offensive Security Recon Tool\",\"datePublished\":\"2020-05-26T15:39:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/\"},\"wordCount\":248,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png\",\"keywords\":[\"Security Recon\",\"Sharingan\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/\",\"name\":\"Sharingan : Offensive Security Recon Tool!Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png\",\"datePublished\":\"2020-05-26T15:39:51+00:00\",\"description\":\"Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I'm relatively new to offensive security\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/sharingan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sharingan : Offensive Security Recon Tool!Kalilinuxtutorials","description":"Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I'm relatively new to offensive security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/sharingan\/","og_locale":"en_US","og_type":"article","og_title":"Sharingan : Offensive Security Recon Tool!Kalilinuxtutorials","og_description":"Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I'm relatively new to offensive security","og_url":"https:\/\/kalilinuxtutorials.com\/sharingan\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-26T15:39:51+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Sharingan : Offensive Security Recon Tool","datePublished":"2020-05-26T15:39:51+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/"},"wordCount":248,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","keywords":["Security Recon","Sharingan"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/","url":"https:\/\/kalilinuxtutorials.com\/sharingan\/","name":"Sharingan : Offensive Security Recon Tool!Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","datePublished":"2020-05-26T15:39:51+00:00","description":"Sharingan is a recon multitool for offensive security \/ bug bounty. This is very much a work in progress and I'm relatively new to offensive security","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/sharingan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/sharingan\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-O7Wy1INAgWg\/XsTYZaEwYhI\/AAAAAAAAGZM\/8MlPwsLsf2s8Vi-VE_nll8Y0eyV1ll7wACLcBGAsYHQ\/s1600\/Sharingan.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35132,"url":"https:\/\/kalilinuxtutorials.com\/cybersecurity-conferences\/","url_meta":{"origin":10634,"position":0},"title":"Cybersecurity Conferences &#8211; A Comprehensive Slide Collection","author":"Varshini","date":"October 10, 2024","format":false,"excerpt":"Comprehensive repository for presentation slides from major cybersecurity conferences held in 2023 and 2024. It provides quick access to the latest insights and research presented at these notable events, catering to professionals and enthusiasts in the field of cybersecurity. Conference presentation slides: Black Hat USA 2024 slides (3-8 August,2024) REcon\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9-2DJEtPN6t77zpkdOT7D4ENN85wT45bYJU49rnDooV2IzL_PTsa_D6PUR_Xmrdn_K_8iD1vtVLPdyGrNFDHfrwfD92K5zrqWLPM2H17HCeeHGutIb_PCmgVU78Gf51busnwGgACxE5GBuydqE_sYHQQ6Jm0Txu6lPgrS2dNhF6Xje9xDKRncaJ74hCzW\/s1600\/Cybersecurity%20Conferences.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9-2DJEtPN6t77zpkdOT7D4ENN85wT45bYJU49rnDooV2IzL_PTsa_D6PUR_Xmrdn_K_8iD1vtVLPdyGrNFDHfrwfD92K5zrqWLPM2H17HCeeHGutIb_PCmgVU78Gf51busnwGgACxE5GBuydqE_sYHQQ6Jm0Txu6lPgrS2dNhF6Xje9xDKRncaJ74hCzW\/s1600\/Cybersecurity%20Conferences.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9-2DJEtPN6t77zpkdOT7D4ENN85wT45bYJU49rnDooV2IzL_PTsa_D6PUR_Xmrdn_K_8iD1vtVLPdyGrNFDHfrwfD92K5zrqWLPM2H17HCeeHGutIb_PCmgVU78Gf51busnwGgACxE5GBuydqE_sYHQQ6Jm0Txu6lPgrS2dNhF6Xje9xDKRncaJ74hCzW\/s1600\/Cybersecurity%20Conferences.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9-2DJEtPN6t77zpkdOT7D4ENN85wT45bYJU49rnDooV2IzL_PTsa_D6PUR_Xmrdn_K_8iD1vtVLPdyGrNFDHfrwfD92K5zrqWLPM2H17HCeeHGutIb_PCmgVU78Gf51busnwGgACxE5GBuydqE_sYHQQ6Jm0Txu6lPgrS2dNhF6Xje9xDKRncaJ74hCzW\/s1600\/Cybersecurity%20Conferences.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9-2DJEtPN6t77zpkdOT7D4ENN85wT45bYJU49rnDooV2IzL_PTsa_D6PUR_Xmrdn_K_8iD1vtVLPdyGrNFDHfrwfD92K5zrqWLPM2H17HCeeHGutIb_PCmgVU78Gf51busnwGgACxE5GBuydqE_sYHQQ6Jm0Txu6lPgrS2dNhF6Xje9xDKRncaJ74hCzW\/s1600\/Cybersecurity%20Conferences.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9-2DJEtPN6t77zpkdOT7D4ENN85wT45bYJU49rnDooV2IzL_PTsa_D6PUR_Xmrdn_K_8iD1vtVLPdyGrNFDHfrwfD92K5zrqWLPM2H17HCeeHGutIb_PCmgVU78Gf51busnwGgACxE5GBuydqE_sYHQQ6Jm0Txu6lPgrS2dNhF6Xje9xDKRncaJ74hCzW\/s1600\/Cybersecurity%20Conferences.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33289,"url":"https:\/\/kalilinuxtutorials.com\/x-recon\/","url_meta":{"origin":10634,"position":1},"title":"X-Recon : Mastering XSS Vulnerability Scanning And Web Reconnaissance","author":"Varshini","date":"June 10, 2024","format":false,"excerpt":"A sophisticated tool designed for web application security enthusiasts. This utility specializes in identifying web page inputs and performing comprehensive XSS scanning. Whether you're looking to uncover subdomains, analyze forms, or test for XSS vulnerabilities, X-Recon provides all the necessary functionalities to enhance your security testing efforts. Features: Subdomain Discovery:\u2026","rel":"","context":"In &quot;Web Application Security&quot;","block_context":{"text":"Web Application Security","link":"https:\/\/kalilinuxtutorials.com\/category\/web-application-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10762,"url":"https:\/\/kalilinuxtutorials.com\/enumy\/","url_meta":{"origin":10634,"position":2},"title":"Enumy : Linux Post Exploitation Privilege Escalation Enumeration","author":"R K","date":"June 16, 2020","format":false,"excerpt":"Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation phase. Running enumy will enumerate the box for common security vulnerabilities. Installation You can download the final binary from the release x86 or x64 tab. Statically linked\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"FisherMan : CLI Program That Collects Information From Facebook User Profiles Via Selenium","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-GYGGAL1ljCU\/YSXDC_PdNQI\/AAAAAAAAKjY\/2xupSNIxKwEm5nm89HSBxs704sMUC9gOACLcBGAsYHQ\/s687\/template%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-GYGGAL1ljCU\/YSXDC_PdNQI\/AAAAAAAAKjY\/2xupSNIxKwEm5nm89HSBxs704sMUC9gOACLcBGAsYHQ\/s687\/template%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-GYGGAL1ljCU\/YSXDC_PdNQI\/AAAAAAAAKjY\/2xupSNIxKwEm5nm89HSBxs704sMUC9gOACLcBGAsYHQ\/s687\/template%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":4948,"url":"https:\/\/kalilinuxtutorials.com\/recon-t\/","url_meta":{"origin":10634,"position":3},"title":"Recon-T : Reconnaisance &#8211; Footprinting &#8211; Information Disclosure","author":"R K","date":"May 12, 2019","format":false,"excerpt":"Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from. Features Information Security HeadersWAF DetectorBanner GrabbingPhone NumberCredit Card NumberEmailUS Social Security NumberUrl CrawlDom Paramter UrlInternal Dynamic ParamterExternal Dynamic ParamterInternal LinkExternal LinkPort ScannerSubdomain Enumeration Recon-TRequirements clickrequestscolorlogbs4tldextract Also Read - PeekABoo : Penetration Testing To\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7016,"url":"https:\/\/kalilinuxtutorials.com\/osmedeus-fully-automated-offensive-security-framework\/","url_meta":{"origin":10634,"position":4},"title":"Osmedeus  &#8211; Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning","author":"R K","date":"October 25, 2019","format":false,"excerpt":"Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git clone https:\/\/github.com\/j3ssie\/Osmedeuscd Osmedeus.\/install.sh This install only focus on Kali linux How To Use? If you have no\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11391,"url":"https:\/\/kalilinuxtutorials.com\/geo-recon\/","url_meta":{"origin":10634,"position":5},"title":"Geo-Recon : An OSINT CLI Tool Desgined To Fast Track IP Reputation","author":"R K","date":"September 7, 2020","format":false,"excerpt":"Geo-Recon is an OSINT CLI tool designed to fast track IP Reputation and Geo-locaton look up for Security Analysts. Setup This tool is compactible with: Any Linux Operating System (Debian, Ubuntu, CentOS)Termux Linux Setup git clone https:\/\/github.com\/radioactivetobi\/geo-recon.git cd geo-recon chmod +x geo-recon.py pip install -r requirements.txt Termux Setup git clone\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10634"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10634\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16320"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}