{"id":32684,"date":"2024-04-08T06:55:16","date_gmt":"2024-04-08T06:55:16","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32684"},"modified":"2024-04-08T06:55:20","modified_gmt":"2024-04-08T06:55:20","slug":"zero-e","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/zero-e\/","title":{"rendered":"Zero-E : The Ultimate Automated Network Enumeration Tool For Effortless Security Auditing"},"content":{"rendered":"\n<p>Host discovery and service enumeration are part of every network pentest and routine check. <\/p>\n\n\n\n<p>It&#8217;s relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time. <\/p>\n\n\n\n<p>Zero-E (ZrE) aims to automate the entire process in a fire-and-forget manner, from initial open port and live host discovery scans to in-depth scanning of only active hosts and open ports, to free up our attention to work on other things and save valuable time. <\/p>\n\n\n\n<p>It uses a thoughtful, extensively-tested methodology that balances accuracy and efficiency. <\/p>\n\n\n\n<p>It&#8217;s zero effort, zero error network enumeration made easy with zero experience required. Among many other functions, it generates multiple files for various analysis purposes. <\/p>\n\n\n\n<p>So embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you.<\/p>\n\n\n\n<p>Please consider supporting this project with\u00a0<a href=\"https:\/\/www.buymeacoffee.com\/inscyght\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BuyMeACoffee<\/a>\u00a0or Bitcoin (wallet address: 37Gofs5XGv8zB8odoFTJLv8NZk9TvwSr3i)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Features<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#features\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Performs initial discovery scans for alive hosts and open ports<\/li>\n\n\n\n<li>Generates a file with alive hosts and a file with open TCP and UDP (if enabled) ports for reference<\/li>\n\n\n\n<li>Performs in-depth TCP and UDP (if enabled) service scans against alive hosts and open ports from discovery scans<\/li>\n\n\n\n<li>Includes a checkpoint system for resuming scans in case they&#8217;re stopped before completion<\/li>\n\n\n\n<li>Option for both external and internal scans, which changes scan methodology appropriately<\/li>\n\n\n\n<li>Allows for enabling or disabling UDP scans<\/li>\n\n\n\n<li>Detects, alerts on, and excludes from service scans, hosts with more than 100 ports open\n<ul class=\"wp-block-list\">\n<li>It&#8217;s highly unusual for a host to have this many ports open and indicates a possible deception host or firewall affecting scan results<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Generates a file with open ports in Nessus-ready format for faster scanning<\/li>\n\n\n\n<li>Accepts command switches, but reverts to interactive prompts if required switches are left out<\/li>\n\n\n\n<li>Detects and informs you of invalid targets<\/li>\n\n\n\n<li>Written in Bash for maximum compatibility and ease of use<\/li>\n\n\n\n<li>Includes timestamps in terminal output and a log file for reference<\/li>\n\n\n\n<li>On internal scans, which typically include more target hosts, detects the total number of hosts and adjusts scan speeds accordingly<\/li>\n\n\n\n<li>Checks if running on MacOS and adjusts commands accordingly (untested)<\/li>\n\n\n\n<li>Includes a\u00a0<code>--count<\/code>\u00a0option to calculate and display the total number of target IP addresses<\/li>\n\n\n\n<li>Includes a\u00a0<code>--geniplist<\/code>\u00a0option that generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file without needing ipcalc or prips<\/li>\n\n\n\n<li>Includes a\u00a0<code>--only<\/code>\u00a0option to enable only UDP scanning and\/or running only the specified stage\/scan\n<ul class=\"wp-block-list\">\n<li>Use case example: Initial run has UDP scans disabled for faster completion. Once completed, use &#8211;only and enable UDP to only run UDP scans while analyzing TCP results<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Includes a\u00a0<code>--ngineer<\/code>\u00a0option that enables the entry of custom masscan and nmap options for each scan (experimental)<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Requirements<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#requirements\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nmap<\/li>\n\n\n\n<li>Masscan<\/li>\n\n\n\n<li>iptables (pfctl for MacOS)<\/li>\n\n\n\n<li>dos2unix<\/li>\n\n\n\n<li>realpath<\/li>\n\n\n\n<li>A file containing the list of target IP addresses\n<ul class=\"wp-block-list\">\n<li>Each single IP, range, and\/or CIDR should be on a new line in typical Nmap\/Masscan syntax<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How To<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#how-to\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Interactive Prompts (Default method)<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#interactive-prompts-default-method\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><code>sudo .\/zero-e.sh<\/code><\/li>\n\n\n\n<li>At the prompts, enter:\n<ol class=\"wp-block-list\">\n<li>the stage to start at<\/li>\n\n\n\n<li>the scan type (e.g. [i]nternal or [e]xternal)<\/li>\n\n\n\n<li>whether to enable UDP scans<\/li>\n\n\n\n<li>the desired file path of the output directory for generated files<\/li>\n\n\n\n<li>the file path of the file containing the target IP addresses<\/li>\n\n\n\n<li>the file path of the file containing the IP addresses to exclude from scans, if any<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li>Embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Switches (Advanced)<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#switches-advanced\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><code>sudo .\/zero-e.sh [-e || -i] [-o output_directory] [-t targets_file] [-x [excludes_file]] [-U || -u] [-S [stage] || -s] [--count filename] [--geniplist filename] [--ngineer] [--only]<\/code>\n<ul class=\"wp-block-list\">\n<li><code>--help<\/code>: Self-explanatory &#8212; does not require sudo<\/li>\n\n\n\n<li><code>--count<\/code>: Calculates and displays the total number of target IP addresses &#8212; does not require sudo<\/li>\n\n\n\n<li><code>--geniplist<\/code>: Generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file &#8212; does not require sudo<\/li>\n\n\n\n<li><code>--ngineer<\/code>: Enables entry of custom masscan and Nmap command options<\/li>\n\n\n\n<li><code>--only<\/code>: Only run UDP scans if enabled, and\/or specified stage if provided &#8212; does not apply to other options<\/li>\n\n\n\n<li><code>--defaults<\/code>: Runs ZrE using default settings &#8212; using options with this will overwrite the default for that option\n<ul class=\"wp-block-list\">\n<li>Default options are:\n<ul class=\"wp-block-list\">\n<li>Stage (-S\/-s) &#8212; starts at initial alives scan<\/li>\n\n\n\n<li>Targets file (-t) &#8212; .\/targets.txt<\/li>\n\n\n\n<li>Output directory (-o) &#8212; .\/ZrE-output<\/li>\n\n\n\n<li>Excluded targets (-x) &#8212; none<\/li>\n\n\n\n<li>UDP scans (-U\/-u) &#8212; enabled<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><code>-e<\/code>: Tells ZrE to run external methodology scans &#8212; cannot be used with -i<\/li>\n\n\n\n<li><code>-i<\/code>: Tells ZrE to run internal methodology scans &#8212; cannot be used with -e<\/li>\n\n\n\n<li><code>-o<\/code>: Sets the output directory where generated files will be saved to<\/li>\n\n\n\n<li><code>-t<\/code>: Sets the file containing the target IP addresses &#8212; each single IP, range, or CIDR must be on a new line<\/li>\n\n\n\n<li><code>-x<\/code>: Sets the file containing the IP addresses to exclude &#8212; provide no argument to disable and not be prompted<\/li>\n\n\n\n<li><code>-U<\/code>: Enables UDP scans &#8212; cannot be used with -u<\/li>\n\n\n\n<li><code>-u<\/code>: Disables UDP scans &#8212; cannot be used with -U<\/li>\n\n\n\n<li><code>-S<\/code>: With no arguments, resumes from saved stage &#8212; cannot be used with -s\n<ul class=\"wp-block-list\">\n<li>Will skip to the specified stage, if provided &#8212; valid stages are:\n<ul class=\"wp-block-list\">\n<li>discovery-alives<\/li>\n\n\n\n<li>discovery-openports<\/li>\n\n\n\n<li>discovery-udp<\/li>\n\n\n\n<li>discovery-lists<\/li>\n\n\n\n<li>servicescan-tcp<\/li>\n\n\n\n<li>servicescan-udp<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><code>-s<\/code>: Disables stage resuming and selection and starts at initial alives scan &#8212; cannot be used with -S\n<ul class=\"wp-block-list\">\n<li>Stages are still saved for resuming later as ZrE runs<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>If required options aren&#8217;t provided, Zero-E will revert to prompting the user for the missing option(s)<\/li>\n\n\n\n<li>Embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Install To $PATH<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#install-to-path\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Add\u00a0<code>zero-e.sh<\/code>\u00a0to PATH, so it&#8217;s able to be called as a command from anywhere\n<ul class=\"wp-block-list\">\n<li>Run the included\u00a0<code>installzre.sh<\/code>, which will add Zero-E to PATH for you; or use\u00a0<code>-b<\/code>\u00a0to specify a destination.<\/li>\n\n\n\n<li>If you prefer doing this manually, here&#8217;s how I set mine up: I set up an alias (<code>zrepath<\/code>) in my shell (<code>~\/.zshrc<\/code>) that quickly copies ZrE into the primary PATH directory (<code>\/usr\/local\/bin<\/code>) as\u00a0<code>zeroe<\/code>\u00a0for quick updating when changes are made\n<ul class=\"wp-block-list\">\n<li><code>alias zrepath='sudo cp \/path\/to\/zero-e.sh \/usr\/local\/bin\/zeroe &amp;&amp; sudo chmod +x \/usr\/local\/bin\/zeroe'<\/code><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>It must be copied to\u00a0<em>\/usr\/local\/bin<\/em>\u00a0so it&#8217;s runnable with\u00a0<em>sudo<\/em><\/li>\n\n\n\n<li>Whenever you pull updates, rerun\u00a0<code>installzre.sh<\/code>\u00a0or your alias<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Run Zero-E by calling it with\u00a0<code>zeroe<\/code>\u00a0if\u00a0<em>zrepath.sh<\/em>\u00a0was used, or whatever you named it if set up manually, with or without options:\u00a0<code>sudo zeroe [options]<\/code><\/li>\n\n\n\n<li>Embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Stage System<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#stage-system\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The stage function allows for resuming from the automatically saved stage, or from a specified stage<\/li>\n\n\n\n<li>If resuming a stage, it resumes both masscan and Nmap scans from exactly where they left off<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Resuming From A Saved Stage<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#resuming-from-a-saved-stage\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Option 1: Pass the\u00a0<code>-S<\/code>\u00a0option with no arguments<\/li>\n\n\n\n<li>Option 2: Run ZrE without any options\n<ul class=\"wp-block-list\">\n<li>At the prompt, enter\u00a0<code>y<\/code>\u00a0to resume<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Restarting At A Specified Stage<\/strong><a href=\"https:\/\/github.com\/Inscyght\/Zero-E#restarting-at-a-specified-stage\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Skipping to a specific stage will only work if doing so after running ZrE up to that point, and specifying the previous output directory. Skipping will error if running ZrE at that stage for the first time, as certain stages require files that won&#8217;t yet exist.<\/li>\n\n\n\n<li>ZrE will automatically create backups if it detects important output files that will be overwritten when running subsequent stages.<\/li>\n<\/ul>\n\n\n\n<p><strong>Option 1:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pass the\u00a0<code>-S<\/code>\u00a0option with the desired stage name<\/li>\n<\/ul>\n\n\n\n<p><strong>Option 2:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Run ZrE without any options\n<ul class=\"wp-block-list\">\n<li>At the prompt, enter the desired stage name<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Stages And Explanations:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>discovery-alives\n<ul class=\"wp-block-list\">\n<li>The start of the external and internal scan process.\n<ul class=\"wp-block-list\">\n<li>External: runs an Nmap ping scan<\/li>\n\n\n\n<li>Internal: runs masscan with variable (depending on the total number of initial targets)<code>--top-ports<\/code>\u00a0to discover alive hosts<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>discovery-openports\n<ul class=\"wp-block-list\">\n<li>External: runs masscan against all targets to discover alive hosts and open ports<\/li>\n\n\n\n<li>Internal: runs masscan against all ports of alives only<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>discovery-udp\n<ul class=\"wp-block-list\">\n<li>If UDP is enabled, runs Nmap against alives to discover open UDP ports<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>discovery-lists\n<ul class=\"wp-block-list\">\n<li>Creates the alives list and open ports list<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>servicescan-tcp\n<ul class=\"wp-block-list\">\n<li>Runs an in-depth Nmap service scan against alive hosts and open TCP ports<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>servicescan-udp\n<ul class=\"wp-block-list\">\n<li>Runs an in-depth Nmap service scan against alive hosts and open UDP ports<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/Inscyght\/Zero-E\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Host discovery and service enumeration are part of every network pentest and routine check. It&#8217;s relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time. Zero-E (ZrE) aims to automate the entire process in a fire-and-forget [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5840],"tags":[737,6321,6052,6684],"class_list":["post-32684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-penetration-testing-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-zero-e"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-E : The Ultimate Automated Network Enumeration Tool For<\/title>\n<meta name=\"description\" content=\"Host discovery and service enumeration are part of every network pentest and routine check. It&#039;s relatively straightforward, and we could all\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/zero-e\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-E : The Ultimate Automated Network Enumeration Tool For\" \/>\n<meta property=\"og:description\" content=\"Host discovery and service enumeration are part of every network pentest and routine check. It&#039;s relatively straightforward, and we could all\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/zero-e\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-08T06:55:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-08T06:55:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Zero-E : The Ultimate Automated Network Enumeration Tool For Effortless Security Auditing\",\"datePublished\":\"2024-04-08T06:55:16+00:00\",\"dateModified\":\"2024-04-08T06:55:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/\"},\"wordCount\":1344,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"Zero-E\"],\"articleSection\":[\"Pentesting Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/zero-e\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/\",\"name\":\"Zero-E : The Ultimate Automated Network Enumeration Tool For\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp\",\"datePublished\":\"2024-04-08T06:55:16+00:00\",\"dateModified\":\"2024-04-08T06:55:20+00:00\",\"description\":\"Host discovery and service enumeration are part of every network pentest and routine check. It's relatively straightforward, and we could all\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/zero-e\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-E : The Ultimate Automated Network Enumeration Tool For","description":"Host discovery and service enumeration are part of every network pentest and routine check. It's relatively straightforward, and we could all","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/zero-e\/","og_locale":"en_US","og_type":"article","og_title":"Zero-E : The Ultimate Automated Network Enumeration Tool For","og_description":"Host discovery and service enumeration are part of every network pentest and routine check. It's relatively straightforward, and we could all","og_url":"https:\/\/kalilinuxtutorials.com\/zero-e\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-04-08T06:55:16+00:00","article_modified_time":"2024-04-08T06:55:20+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Zero-E : The Ultimate Automated Network Enumeration Tool For Effortless Security Auditing","datePublished":"2024-04-08T06:55:16+00:00","dateModified":"2024-04-08T06:55:20+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/"},"wordCount":1344,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","keywords":["cybersecurity","informationsecurity","kalilinux","Zero-E"],"articleSection":["Pentesting Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/zero-e\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/","url":"https:\/\/kalilinuxtutorials.com\/zero-e\/","name":"Zero-E : The Ultimate Automated Network Enumeration Tool For","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","datePublished":"2024-04-08T06:55:16+00:00","dateModified":"2024-04-08T06:55:20+00:00","description":"Host discovery and service enumeration are part of every network pentest and routine check. It's relatively straightforward, and we could all","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/zero-e\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/zero-e\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxGhGa1PlUmPFk_coY4bWyQwGNIw7Td-mjDE9AOptlGoFN1BzMnNRA_KtmTLjo1jAJveviOP2X8rHYFNKovZZZtbWr26MbIQVF6JrCIbvrIw0rJK6L1LF1Qhn_aCI-HyRCZpx16RTKrG4DXvR3DgbYJWTwO8RU9QCcYDCouo_2OGClBrLQX3zm5mo2tkyb\/s16000\/Zero-E%20(1).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6497,"url":"https:\/\/kalilinuxtutorials.com\/activereign-network-enumeration-attack-toolset\/","url_meta":{"origin":32684,"position":0},"title":"ActiveReign : A Network Enumeration &#038; Attack Toolset","author":"R K","date":"September 13, 2019","format":false,"excerpt":"ActiveReign is a network enumeration and attack toolset.A while back I was challenged to write a discovery tool with Python3 that could automate the process of finding sensitive information on network file shares. After writing the entire tool with pysmb, and adding features such as the ability to open and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3852,"url":"https:\/\/kalilinuxtutorials.com\/goscan-network-scanner-2019\/","url_meta":{"origin":32684,"position":1},"title":"GoScan : Interactive Network Scanner 2019","author":"R K","date":"February 11, 2019","format":false,"excerpt":"GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap. GoScan can now be used to perform host discovery, port scanning, and service enumeration not only in situations where being stealthy is not a priority and time is limited (think at CTFs, OSCP, exams,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4307,"url":"https:\/\/kalilinuxtutorials.com\/goscan\/","url_meta":{"origin":32684,"position":2},"title":"Goscan : Interactive Network Scanner","author":"R K","date":"March 22, 2019","format":false,"excerpt":"GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap. Although it started as a small side-project I developed in order to learn @golang, GoScan can now be used to perform host discovery, port scanning, and service enumeration not only in situations where being\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31862,"url":"https:\/\/kalilinuxtutorials.com\/vps-bug-bounty-tools\/","url_meta":{"origin":32684,"position":3},"title":"VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation","author":"Varshini","date":"January 30, 2024","format":false,"excerpt":"Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd \/tmp && git clone https:\/\/github.com\/drak3hft7\/VPS-Bug-Bounty-Tools cd VPS-Bug-Bounty-Tools sudo .\/Tools-BugBounty-installer.sh Example During Installation: List Of Tools Inserted: Network Scanner: Nmap Masscan Naabu Subdomain Enumeration And DNS Resolver: Massdns Subfinder Knock Lazyrecon\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsXQ8rtUhTrLcqKJ_jWGLwjsO3_XuptSezxk8qSamICv7SV4UJfnK9u2tcB-feBfQF13T4NmuP7Gf_QDLw5t_aq7A82YsRK6bDUot3UUPUWJAWFDEQnnv5MQNS-nehYKqC4vIoFKpzTVXZwlNjBLc9VPlv4pvSl0HE1PmQ_SnEml1sNGzn3u8Ve2TBLtW6\/s16000\/Untitled%20design%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsXQ8rtUhTrLcqKJ_jWGLwjsO3_XuptSezxk8qSamICv7SV4UJfnK9u2tcB-feBfQF13T4NmuP7Gf_QDLw5t_aq7A82YsRK6bDUot3UUPUWJAWFDEQnnv5MQNS-nehYKqC4vIoFKpzTVXZwlNjBLc9VPlv4pvSl0HE1PmQ_SnEml1sNGzn3u8Ve2TBLtW6\/s16000\/Untitled%20design%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsXQ8rtUhTrLcqKJ_jWGLwjsO3_XuptSezxk8qSamICv7SV4UJfnK9u2tcB-feBfQF13T4NmuP7Gf_QDLw5t_aq7A82YsRK6bDUot3UUPUWJAWFDEQnnv5MQNS-nehYKqC4vIoFKpzTVXZwlNjBLc9VPlv4pvSl0HE1PmQ_SnEml1sNGzn3u8Ve2TBLtW6\/s16000\/Untitled%20design%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsXQ8rtUhTrLcqKJ_jWGLwjsO3_XuptSezxk8qSamICv7SV4UJfnK9u2tcB-feBfQF13T4NmuP7Gf_QDLw5t_aq7A82YsRK6bDUot3UUPUWJAWFDEQnnv5MQNS-nehYKqC4vIoFKpzTVXZwlNjBLc9VPlv4pvSl0HE1PmQ_SnEml1sNGzn3u8Ve2TBLtW6\/s16000\/Untitled%20design%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsXQ8rtUhTrLcqKJ_jWGLwjsO3_XuptSezxk8qSamICv7SV4UJfnK9u2tcB-feBfQF13T4NmuP7Gf_QDLw5t_aq7A82YsRK6bDUot3UUPUWJAWFDEQnnv5MQNS-nehYKqC4vIoFKpzTVXZwlNjBLc9VPlv4pvSl0HE1PmQ_SnEml1sNGzn3u8Ve2TBLtW6\/s16000\/Untitled%20design%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsXQ8rtUhTrLcqKJ_jWGLwjsO3_XuptSezxk8qSamICv7SV4UJfnK9u2tcB-feBfQF13T4NmuP7Gf_QDLw5t_aq7A82YsRK6bDUot3UUPUWJAWFDEQnnv5MQNS-nehYKqC4vIoFKpzTVXZwlNjBLc9VPlv4pvSl0HE1PmQ_SnEml1sNGzn3u8Ve2TBLtW6\/s16000\/Untitled%20design%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37313,"url":"https:\/\/kalilinuxtutorials.com\/subdominator\/","url_meta":{"origin":32684,"position":4},"title":"Subdominator &#8211; Unleash The Power Of Subdomain Enumeration","author":"Varshini","date":"March 26, 2025","format":false,"excerpt":"Subdominator is a lightweight and fast tool designed for passive subdomain enumeration, primarily used in bug hunting and reconnaissance processes. Developed by RevoltSecurities, it helps cybersecurity professionals and researchers identify potential security vulnerabilities by efficiently enumerating subdomains using various free passive resources. Key Features Of Subdominator Speed and Efficiency: Subdominator\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7190,"url":"https:\/\/kalilinuxtutorials.com\/xray-recon-mapping-osint-gathering\/","url_meta":{"origin":32684,"position":5},"title":"XRay : Tool For Recon, Mapping &#038; OSINT Gathering From Public Networks","author":"R K","date":"November 7, 2019","format":false,"excerpt":"XRay is a tool for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network mapping automatic. How Does it Work? XRay is a very simple tool, it works this way: It'll bruteforce subdomains using a wordlist and DNS requests.For every subdomain\/ip\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32684"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32684\/revisions"}],"predecessor-version":[{"id":32687,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32684\/revisions\/32687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32689"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}