bbot 2.3.0.5384rc0__tar.gz → 2.3.0.5397rc0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of bbot might be problematic. Click here for more details.

Files changed (420) hide show
  1. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/PKG-INFO +1 -1
  2. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/__init__.py +1 -1
  3. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/bloom.py +2 -2
  4. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/diff.py +3 -3
  5. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/regexes.py +2 -2
  6. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/web/web.py +1 -1
  7. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/deadly/nuclei.py +1 -1
  8. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnsbimi.py +1 -1
  9. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/docker_pull.py +1 -1
  10. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/asset_inventory.py +1 -1
  11. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/portscan.py +1 -1
  12. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/telerik.py +1 -1
  13. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_dns.py +1 -1
  14. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bypass403.py +1 -1
  15. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnsdumpster.py +2 -2
  16. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_hunterio.py +1 -1
  17. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_telerik.py +1 -1
  18. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/pyproject.toml +6 -2
  19. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/LICENSE +0 -0
  20. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/README.md +0 -0
  21. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/cli.py +0 -0
  22. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/__init__.py +0 -0
  23. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/config/__init__.py +0 -0
  24. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/config/files.py +0 -0
  25. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/config/logger.py +0 -0
  26. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/core.py +0 -0
  27. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/engine.py +0 -0
  28. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/event/__init__.py +0 -0
  29. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/event/base.py +0 -0
  30. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/event/helpers.py +0 -0
  31. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/flags.py +0 -0
  32. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/__init__.py +0 -0
  33. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/async_helpers.py +0 -0
  34. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/cache.py +0 -0
  35. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/command.py +0 -0
  36. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/depsinstaller/__init__.py +0 -0
  37. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/depsinstaller/installer.py +0 -0
  38. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/depsinstaller/sudo_askpass.py +0 -0
  39. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/dns/__init__.py +0 -0
  40. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/dns/brute.py +0 -0
  41. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/dns/dns.py +0 -0
  42. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/dns/engine.py +0 -0
  43. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/dns/helpers.py +0 -0
  44. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/dns/mock.py +0 -0
  45. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/files.py +0 -0
  46. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/helper.py +0 -0
  47. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/interactsh.py +0 -0
  48. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/libmagic.py +0 -0
  49. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/misc.py +0 -0
  50. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/names_generator.py +0 -0
  51. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/ntlm.py +0 -0
  52. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/process.py +0 -0
  53. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/ratelimiter.py +0 -0
  54. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/regex.py +0 -0
  55. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/url.py +0 -0
  56. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/validators.py +0 -0
  57. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/web/__init__.py +0 -0
  58. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/web/client.py +0 -0
  59. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/web/engine.py +0 -0
  60. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/web/ssl_context.py +0 -0
  61. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/helpers/wordcloud.py +0 -0
  62. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/modules.py +0 -0
  63. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/multiprocess.py +0 -0
  64. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/core/shared_deps.py +0 -0
  65. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/db/sql/models.py +0 -0
  66. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/defaults.yml +0 -0
  67. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/errors.py +0 -0
  68. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/logger.py +0 -0
  69. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/__init__.py +0 -0
  70. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/ajaxpro.py +0 -0
  71. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/anubisdb.py +0 -0
  72. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/apkpure.py +0 -0
  73. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/azure_realm.py +0 -0
  74. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/azure_tenant.py +0 -0
  75. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/baddns.py +0 -0
  76. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/baddns_direct.py +0 -0
  77. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/baddns_zone.py +0 -0
  78. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/badsecrets.py +0 -0
  79. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/base.py +0 -0
  80. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bevigil.py +0 -0
  81. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/binaryedge.py +0 -0
  82. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bucket_amazon.py +0 -0
  83. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bucket_azure.py +0 -0
  84. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bucket_digitalocean.py +0 -0
  85. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bucket_file_enum.py +0 -0
  86. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bucket_firebase.py +0 -0
  87. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bucket_google.py +0 -0
  88. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bufferoverrun.py +0 -0
  89. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/builtwith.py +0 -0
  90. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/bypass403.py +0 -0
  91. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/c99.py +0 -0
  92. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/censys.py +0 -0
  93. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/certspotter.py +0 -0
  94. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/chaos.py +0 -0
  95. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/code_repository.py +0 -0
  96. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/columbus.py +0 -0
  97. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/credshed.py +0 -0
  98. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/crt.py +0 -0
  99. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/deadly/dastardly.py +0 -0
  100. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/deadly/ffuf.py +0 -0
  101. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/deadly/vhost.py +0 -0
  102. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dehashed.py +0 -0
  103. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/digitorus.py +0 -0
  104. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnsbrute.py +0 -0
  105. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnsbrute_mutations.py +0 -0
  106. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnscaa.py +0 -0
  107. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnscommonsrv.py +0 -0
  108. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnsdumpster.py +0 -0
  109. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dnstlsrpt.py +0 -0
  110. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dockerhub.py +0 -0
  111. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/dotnetnuke.py +0 -0
  112. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/emailformat.py +0 -0
  113. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/extractous.py +0 -0
  114. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/ffuf_shortnames.py +0 -0
  115. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/filedownload.py +0 -0
  116. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/fingerprintx.py +0 -0
  117. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/fullhunt.py +0 -0
  118. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/generic_ssrf.py +0 -0
  119. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/git.py +0 -0
  120. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/git_clone.py +0 -0
  121. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/github_codesearch.py +0 -0
  122. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/github_org.py +0 -0
  123. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/github_workflows.py +0 -0
  124. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/gitlab.py +0 -0
  125. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/google_playstore.py +0 -0
  126. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/gowitness.py +0 -0
  127. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/hackertarget.py +0 -0
  128. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/host_header.py +0 -0
  129. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/httpx.py +0 -0
  130. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/hunt.py +0 -0
  131. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/hunterio.py +0 -0
  132. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/iis_shortnames.py +0 -0
  133. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/__init__.py +0 -0
  134. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/aggregate.py +0 -0
  135. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/base.py +0 -0
  136. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/cloudcheck.py +0 -0
  137. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/dnsresolve.py +0 -0
  138. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/excavate.py +0 -0
  139. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internal/speculate.py +0 -0
  140. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/internetdb.py +0 -0
  141. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/ip2location.py +0 -0
  142. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/ipneighbor.py +0 -0
  143. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/ipstack.py +0 -0
  144. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/jadx.py +0 -0
  145. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/leakix.py +0 -0
  146. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/myssl.py +0 -0
  147. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/newsletters.py +0 -0
  148. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/ntlm.py +0 -0
  149. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/oauth.py +0 -0
  150. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/otx.py +0 -0
  151. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/__init__.py +0 -0
  152. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/base.py +0 -0
  153. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/csv.py +0 -0
  154. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/discord.py +0 -0
  155. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/emails.py +0 -0
  156. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/http.py +0 -0
  157. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/json.py +0 -0
  158. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/mysql.py +0 -0
  159. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/neo4j.py +0 -0
  160. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/postgres.py +0 -0
  161. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/python.py +0 -0
  162. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/slack.py +0 -0
  163. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/splunk.py +0 -0
  164. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/sqlite.py +0 -0
  165. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/stdout.py +0 -0
  166. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/subdomains.py +0 -0
  167. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/teams.py +0 -0
  168. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/txt.py +0 -0
  169. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/web_report.py +0 -0
  170. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/output/websocket.py +0 -0
  171. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/paramminer_cookies.py +0 -0
  172. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/paramminer_getparams.py +0 -0
  173. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/paramminer_headers.py +0 -0
  174. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/passivetotal.py +0 -0
  175. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/pgp.py +0 -0
  176. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/postman.py +0 -0
  177. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/postman_download.py +0 -0
  178. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/rapiddns.py +0 -0
  179. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/report/affiliates.py +0 -0
  180. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/report/asn.py +0 -0
  181. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/report/base.py +0 -0
  182. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/robots.py +0 -0
  183. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/secretsdb.py +0 -0
  184. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/securitytrails.py +0 -0
  185. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/securitytxt.py +0 -0
  186. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/shodan_dns.py +0 -0
  187. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/sitedossier.py +0 -0
  188. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/skymem.py +0 -0
  189. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/smuggler.py +0 -0
  190. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/social.py +0 -0
  191. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/sslcert.py +0 -0
  192. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/subdomaincenter.py +0 -0
  193. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/subdomainradar.py +0 -0
  194. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/bucket.py +0 -0
  195. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/github.py +0 -0
  196. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/postman.py +0 -0
  197. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/shodan.py +0 -0
  198. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/sql.py +0 -0
  199. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/subdomain_enum.py +0 -0
  200. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/templates/webhook.py +0 -0
  201. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/trickest.py +0 -0
  202. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/trufflehog.py +0 -0
  203. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/url_manipulation.py +0 -0
  204. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/urlscan.py +0 -0
  205. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/viewdns.py +0 -0
  206. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/virustotal.py +0 -0
  207. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/wafw00f.py +0 -0
  208. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/wappalyzer.py +0 -0
  209. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/wayback.py +0 -0
  210. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/wpscan.py +0 -0
  211. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/modules/zoomeye.py +0 -0
  212. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/baddns-thorough.yml +0 -0
  213. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/cloud-enum.yml +0 -0
  214. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/code-enum.yml +0 -0
  215. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/email-enum.yml +0 -0
  216. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/fast.yml +0 -0
  217. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/kitchen-sink.yml +0 -0
  218. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/spider.yml +0 -0
  219. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/subdomain-enum.yml +0 -0
  220. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web/dirbust-heavy.yml +0 -0
  221. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web/dirbust-light.yml +0 -0
  222. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web/dotnet-audit.yml +0 -0
  223. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web/iis-shortnames.yml +0 -0
  224. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web/paramminer.yml +0 -0
  225. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web-basic.yml +0 -0
  226. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web-screenshots.yml +0 -0
  227. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/presets/web-thorough.yml +0 -0
  228. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/__init__.py +0 -0
  229. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/dispatcher.py +0 -0
  230. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/manager.py +0 -0
  231. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/preset/__init__.py +0 -0
  232. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/preset/args.py +0 -0
  233. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/preset/conditions.py +0 -0
  234. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/preset/environ.py +0 -0
  235. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/preset/path.py +0 -0
  236. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/preset/preset.py +0 -0
  237. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/scanner.py +0 -0
  238. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/stats.py +0 -0
  239. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scanner/target.py +0 -0
  240. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/scripts/docs.py +0 -0
  241. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/__init__.py +0 -0
  242. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/bbot_fixtures.py +0 -0
  243. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/conftest.py +0 -0
  244. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/coverage.cfg +0 -0
  245. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/fastapi_test.py +0 -0
  246. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/owasp_mastg.apk +0 -0
  247. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/run_tests.sh +0 -0
  248. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test.conf +0 -0
  249. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_output.ndjson +0 -0
  250. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/__init__.py +0 -0
  251. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test__module__tests.py +0 -0
  252. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_bbot_fastapi.py +0 -0
  253. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_bloom_filter.py +0 -0
  254. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_cli.py +0 -0
  255. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_command.py +0 -0
  256. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_config.py +0 -0
  257. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_depsinstaller.py +0 -0
  258. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_docs.py +0 -0
  259. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_engine.py +0 -0
  260. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_events.py +0 -0
  261. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_files.py +0 -0
  262. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_helpers.py +0 -0
  263. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_manager_deduplication.py +0 -0
  264. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_manager_scope_accuracy.py +0 -0
  265. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_modules_basic.py +0 -0
  266. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_presets.py +0 -0
  267. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_python_api.py +0 -0
  268. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_regexes.py +0 -0
  269. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_scan.py +0 -0
  270. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_scope.py +0 -0
  271. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_target.py +0 -0
  272. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_1/test_web.py +0 -0
  273. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/__init__.py +0 -0
  274. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/__init__.py +0 -0
  275. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/base.py +0 -0
  276. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_affiliates.py +0 -0
  277. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_aggregate.py +0 -0
  278. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ajaxpro.py +0 -0
  279. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_anubisdb.py +0 -0
  280. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_apkpure.py +0 -0
  281. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_asn.py +0 -0
  282. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_asset_inventory.py +0 -0
  283. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_azure_realm.py +0 -0
  284. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_azure_tenant.py +0 -0
  285. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_baddns.py +0 -0
  286. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_baddns_direct.py +0 -0
  287. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_baddns_zone.py +0 -0
  288. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_badsecrets.py +0 -0
  289. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bevigil.py +0 -0
  290. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_binaryedge.py +0 -0
  291. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bucket_amazon.py +0 -0
  292. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bucket_azure.py +0 -0
  293. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bucket_digitalocean.py +0 -0
  294. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bucket_file_enum.py +0 -0
  295. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bucket_firebase.py +0 -0
  296. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bucket_google.py +0 -0
  297. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_bufferoverrun.py +0 -0
  298. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_builtwith.py +0 -0
  299. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_c99.py +0 -0
  300. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_censys.py +0 -0
  301. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_certspotter.py +0 -0
  302. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_chaos.py +0 -0
  303. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_cloudcheck.py +0 -0
  304. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_code_repository.py +0 -0
  305. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_columbus.py +0 -0
  306. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_credshed.py +0 -0
  307. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_crt.py +0 -0
  308. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_csv.py +0 -0
  309. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dastardly.py +0 -0
  310. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dehashed.py +0 -0
  311. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_digitorus.py +0 -0
  312. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_discord.py +0 -0
  313. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnsbimi.py +0 -0
  314. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnsbrute.py +0 -0
  315. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnsbrute_mutations.py +0 -0
  316. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnscaa.py +0 -0
  317. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnscommonsrv.py +0 -0
  318. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnsresolve.py +0 -0
  319. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dnstlsrpt.py +0 -0
  320. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_docker_pull.py +0 -0
  321. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dockerhub.py +0 -0
  322. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_dotnetnuke.py +0 -0
  323. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_emailformat.py +0 -0
  324. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_emails.py +0 -0
  325. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_excavate.py +0 -0
  326. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_extractous.py +0 -0
  327. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ffuf.py +0 -0
  328. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ffuf_shortnames.py +0 -0
  329. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_filedownload.py +0 -0
  330. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_fingerprintx.py +0 -0
  331. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_fullhunt.py +0 -0
  332. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_generic_ssrf.py +0 -0
  333. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_git.py +0 -0
  334. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_git_clone.py +0 -0
  335. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_github_codesearch.py +0 -0
  336. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_github_org.py +0 -0
  337. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_github_workflows.py +0 -0
  338. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_gitlab.py +0 -0
  339. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_google_playstore.py +0 -0
  340. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_gowitness.py +0 -0
  341. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_hackertarget.py +0 -0
  342. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_host_header.py +0 -0
  343. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_http.py +0 -0
  344. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_httpx.py +0 -0
  345. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_hunt.py +0 -0
  346. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_iis_shortnames.py +0 -0
  347. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_internetdb.py +0 -0
  348. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ip2location.py +0 -0
  349. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ipneighbor.py +0 -0
  350. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ipstack.py +0 -0
  351. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_jadx.py +0 -0
  352. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_json.py +0 -0
  353. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_leakix.py +0 -0
  354. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_mysql.py +0 -0
  355. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_myssl.py +0 -0
  356. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_neo4j.py +0 -0
  357. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_newsletters.py +0 -0
  358. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_ntlm.py +0 -0
  359. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_nuclei.py +0 -0
  360. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_oauth.py +0 -0
  361. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_otx.py +0 -0
  362. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_paramminer_cookies.py +0 -0
  363. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_paramminer_getparams.py +0 -0
  364. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_paramminer_headers.py +0 -0
  365. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_passivetotal.py +0 -0
  366. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_pgp.py +0 -0
  367. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_portscan.py +0 -0
  368. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_postgres.py +0 -0
  369. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_postman.py +0 -0
  370. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_postman_download.py +0 -0
  371. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_python.py +0 -0
  372. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_rapiddns.py +0 -0
  373. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_robots.py +0 -0
  374. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_secretsdb.py +0 -0
  375. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_securitytrails.py +0 -0
  376. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_securitytxt.py +0 -0
  377. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_shodan_dns.py +0 -0
  378. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_sitedossier.py +0 -0
  379. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_skymem.py +0 -0
  380. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_slack.py +0 -0
  381. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_smuggler.py +0 -0
  382. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_social.py +0 -0
  383. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_speculate.py +0 -0
  384. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_splunk.py +0 -0
  385. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_sqlite.py +0 -0
  386. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_sslcert.py +0 -0
  387. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_stdout.py +0 -0
  388. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_subdomaincenter.py +0 -0
  389. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_subdomainradar.py +0 -0
  390. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_subdomains.py +0 -0
  391. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_teams.py +0 -0
  392. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_trickest.py +0 -0
  393. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_trufflehog.py +0 -0
  394. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_txt.py +0 -0
  395. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_url_manipulation.py +0 -0
  396. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_urlscan.py +0 -0
  397. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_vhost.py +0 -0
  398. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_viewdns.py +0 -0
  399. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_virustotal.py +0 -0
  400. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_wafw00f.py +0 -0
  401. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_wappalyzer.py +0 -0
  402. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_wayback.py +0 -0
  403. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_web_report.py +0 -0
  404. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_websocket.py +0 -0
  405. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_wpscan.py +0 -0
  406. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/module_tests/test_module_zoomeye.py +0 -0
  407. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/template_tests/__init__.py +0 -0
  408. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/test_step_2/template_tests/test_template_subdomain_enum.py +0 -0
  409. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/testsslcert.pem +0 -0
  410. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/test/testsslkey.pem +0 -0
  411. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/devops_mutations.txt +0 -0
  412. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/ffuf_shortname_candidates.txt +0 -0
  413. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/ms_on_prem_subdomains.txt +0 -0
  414. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/nameservers.txt +0 -0
  415. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/paramminer_headers.txt +0 -0
  416. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/paramminer_parameters.txt +0 -0
  417. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/raft-small-extensions-lowercase_CLEANED.txt +0 -0
  418. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/top_open_ports_nmap.txt +0 -0
  419. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/valid_url_schemes.txt +0 -0
  420. {bbot-2.3.0.5384rc0 → bbot-2.3.0.5397rc0}/bbot/wordlists/wordninja_dns.txt.gz +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: bbot
3
- Version: 2.3.0.5384rc0
3
+ Version: 2.3.0.5397rc0
4
4
  Summary: OSINT automation for hackers.
5
5
  Home-page: https://github.com/blacklanternsecurity/bbot
6
6
  License: GPL-3.0
@@ -1,4 +1,4 @@
1
1
  # version placeholder (replaced by poetry-dynamic-versioning)
2
- __version__ = "v2.3.0.5384rc"
2
+ __version__ = "v2.3.0.5397rc"
3
3
 
4
4
  from .scanner import Scanner, Preset
@@ -5,14 +5,14 @@ import mmap
5
5
 
6
6
  class BloomFilter:
7
7
  """
8
- Simple bloom filter implementation capable of rougly 400K lookups/s.
8
+ Simple bloom filter implementation capable of roughly 400K lookups/s.
9
9
 
10
10
  BBOT uses bloom filters in scenarios like DNS brute-forcing, where it's useful to keep track
11
11
  of which mutations have been tried so far.
12
12
 
13
13
  A 100-megabyte bloom filter (800M bits) can store 10M entries with a .01% false-positive rate.
14
14
  A python hash is 36 bytes. So if you wanted to store these in a set, this would take up
15
- 36 * 10M * 2 (key+value) == 720 megabytes. So we save rougly 7 times the space.
15
+ 36 * 10M * 2 (key+value) == 720 megabytes. So we save roughly 7 times the space.
16
16
  """
17
17
 
18
18
  def __init__(self, size=8000000):
@@ -94,7 +94,7 @@ class HttpCompare:
94
94
  baseline_1_json = xmltodict.parse(baseline_1.text)
95
95
  baseline_2_json = xmltodict.parse(baseline_2.text)
96
96
  except ExpatError:
97
- log.debug(f"Cant HTML parse for {self.baseline_url}. Switching to text parsing as a backup")
97
+ log.debug(f"Can't HTML parse for {self.baseline_url}. Switching to text parsing as a backup")
98
98
  baseline_1_json = baseline_1.text.split("\n")
99
99
  baseline_2_json = baseline_2.text.split("\n")
100
100
 
@@ -203,7 +203,7 @@ class HttpCompare:
203
203
  )
204
204
 
205
205
  if subject_response is None:
206
- # this can be caused by a WAF not liking the header, so we really arent interested in it
206
+ # this can be caused by a WAF not liking the header, so we really aren't interested in it
207
207
  return (True, "403", reflection, subject_response)
208
208
 
209
209
  if check_reflection:
@@ -225,7 +225,7 @@ class HttpCompare:
225
225
  subject_json = xmltodict.parse(subject_response.text)
226
226
 
227
227
  except ExpatError:
228
- log.debug(f"Cant HTML parse for {subject.split('?')[0]}. Switching to text parsing as a backup")
228
+ log.debug(f"Can't HTML parse for {subject.split('?')[0]}. Switching to text parsing as a backup")
229
229
  subject_json = subject_response.text.split("\n")
230
230
 
231
231
  diff_reasons = []
@@ -23,7 +23,7 @@ num_regex = re.compile(r"\d+")
23
23
  _ipv4_regex = r"(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)(?:\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)){3}"
24
24
  ipv4_regex = re.compile(_ipv4_regex, re.I)
25
25
 
26
- # IPv6 is complicated, so we have accomodate alternative patterns,
26
+ # IPv6 is complicated, so we have accommodate alternative patterns,
27
27
  # :(:[A-F0-9]{1,4}){1,7} == ::1, ::ffff:1
28
28
  # ([A-F0-9]{1,4}:){1,7}: == 2001::, 2001:db8::, 2001:db8:0:1:2:3::
29
29
  # ([A-F0-9]{1,4}:){1,6}:([A-F0-9]{1,4}) == 2001::1, 2001:db8::1, 2001:db8:0:1:2:3::1
@@ -118,7 +118,7 @@ event_type_regexes = OrderedDict(
118
118
  scan_name_regex = re.compile(r"[a-z]{3,20}_[a-z]{3,20}")
119
119
 
120
120
 
121
- # For use with excavate paramaters extractor
121
+ # For use with excavate parameters extractor
122
122
  input_tag_regex = re.compile(
123
123
  r"<input[^>]+?name=[\"\']?([\.$\w]+)[\"\']?(?:[^>]*?value=[\"\']([=+\/\w]*)[\"\'])?[^>]*>"
124
124
  )
@@ -451,7 +451,7 @@ class WebHelper(EngineClient):
451
451
  Perform an html parse of the 'markup' argument and return a soup instance
452
452
 
453
453
  >>> email_type = soup.find(type="email")
454
- Searches the soup instance for all occurances of the passed in argument
454
+ Searches the soup instance for all occurrences of the passed in argument
455
455
  """
456
456
  try:
457
457
  soup = BeautifulSoup(
@@ -227,7 +227,7 @@ class nuclei(BaseModule):
227
227
  command.append(option)
228
228
 
229
229
  if self.scan.config.get("interactsh_disable") is True:
230
- self.info("Disbling interactsh in accordance with global settings")
230
+ self.info("Disabling interactsh in accordance with global settings")
231
231
  command.append("-no-interactsh")
232
232
 
233
233
  if self.mode == "technology":
@@ -19,7 +19,7 @@
19
19
  #
20
20
  # NOTE: .svg file extensions are filtered from inclusion by default, modify "url_extension_blacklist" appropriately if you want the .svg image to be considered for download.
21
21
  #
22
- # NOTE: use the "filedownload" module if you to download .svg and .pem files. .pem will be downloaded by defaut, .svg will require a customised configuration for that module.
22
+ # NOTE: use the "filedownload" module if you to download .svg and .pem files. .pem will be downloaded by default, .svg will require a customised configuration for that module.
23
23
  #
24
24
  # The domain portion of any URL_UNVERIFIED's will be extracted by the various internal modules if .svg is not filtered.
25
25
  #
@@ -102,7 +102,7 @@ class docker_pull(BaseModule):
102
102
  url = f"{registry}/v2/{repository}/tags/list"
103
103
  r = await self.docker_api_request(url)
104
104
  if r is None or r.status_code != 200:
105
- self.log.warning(f"Could not retrieve all tags for {repository} asuming tag:latest only.")
105
+ self.log.warning(f"Could not retrieve all tags for {repository} assuming tag:latest only.")
106
106
  self.log.debug(f"Response: {r}")
107
107
  return ["latest"]
108
108
  try:
@@ -259,7 +259,7 @@ class Asset:
259
259
  # ips
260
260
  self.ip_addresses = set(_make_ip_list(row.get("IP (External)", "")))
261
261
  self.ip_addresses.update(set(_make_ip_list(row.get("IP (Internal)", ""))))
262
- # If user reqests a recheck dont import the following fields to force them to be rechecked
262
+ # If user requests a recheck dont import the following fields to force them to be rechecked
263
263
  if not self.recheck:
264
264
  # ports
265
265
  ports = [i.strip() for i in row.get("Open Ports", "").split(",")]
@@ -104,7 +104,7 @@ class portscan(BaseModule):
104
104
  return True
105
105
 
106
106
  async def handle_batch(self, *events):
107
- # on our first run, we automatically include all our intial scan targets
107
+ # on our first run, we automatically include all our initial scan targets
108
108
  if not self.scanned_initial_targets:
109
109
  self.scanned_initial_targets = True
110
110
  events = set(events)
@@ -173,7 +173,7 @@ class telerik(BaseModule):
173
173
  webresource = "Telerik.Web.UI.WebResource.axd?type=rau"
174
174
  result, _ = await self.test_detector(event.data, webresource)
175
175
  if result:
176
- if "RadAsyncUpload handler is registered succesfully" in result.text:
176
+ if "RadAsyncUpload handler is registered successfully" in result.text:
177
177
  self.debug("Detected Telerik instance (Telerik.Web.UI.WebResource.axd?type=rau)")
178
178
 
179
179
  probe_data = {
@@ -733,7 +733,7 @@ async def test_dns_raw_records(bbot_scanner):
733
733
  dummy_module = DummyModule(scan)
734
734
  scan.modules["dummy_module"] = dummy_module
735
735
  events = [e async for e in scan.async_start()]
736
- # no raw records should be ouptut
736
+ # no raw records should be output
737
737
  assert 0 == len([e for e in events if e.type == "RAW_DNS_RECORD"])
738
738
  # but they should still make it to the module
739
739
  assert 1 == len(
@@ -26,7 +26,7 @@ class TestBypass403_collapsethreshold(ModuleTestBase):
26
26
  async def setup_after_prep(self, module_test):
27
27
  respond_args = {"response_data": "alive"}
28
28
 
29
- # some of these wont work outside of the module because of the complex logic. This doesn't matter, we just need to get more alerts than the threshold.
29
+ # some of these won't work outside of the module because of the complex logic. This doesn't matter, we just need to get more alerts than the threshold.
30
30
 
31
31
  query_payloads = [
32
32
  "%09",
@@ -6,12 +6,12 @@ class TestDNSDumpster(ModuleTestBase):
6
6
  module_test.httpx_mock.add_response(
7
7
  url="https://dnsdumpster.com",
8
8
  headers={"Set-Cookie": "csrftoken=asdf"},
9
- content=b'<!DOCTYPE html>\n<html lang="en">\n <head>\n\n <meta charset="utf-8">\n <meta http-equiv="X-UA-Compatible" content="IE=edge">\n<meta name="google-site-verification" content="vAWNZCy-5XAPGRgA2_NY5HictfnByvgpqOLQUAmVZW0" />\n <meta name="viewport" content="width=device-width, initial-scale=1">\n <meta name="description" content="Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.">\n <meta name="author" content="">\n <link rel="icon" href="/static/favicon.ico">\n <title>DNSdumpster.com - dns recon and research, find and lookup dns records</title>\n\n\n <!-- Bootstrap core CSS -->\n <link href="/static/css/bootstrap.min.css" rel="stylesheet">\n <link href="/static/font-awesome/css/font-awesome.min.css" rel="stylesheet">\n\n <!-- Custom styles for this template -->\n <link href="/static/cover.css?v=1.4" rel="stylesheet">\n\n </head>\n\n <body>\n\n <div class="site-wrapper">\n <div class="site-wrapper-inner">\n<!-- Section 1 -->\n<section id="intro" data-speed="6" data-type="background">\n <div class="container">\n\n <div class="masthead clearfix">\n <div class="container inner">\n <nav>\n <ul class="nav masthead-nav">\n <li><a href="https://dnsdumpster.com/" data-toggle="tooltip" data-placement="bottom" title="Home"><i style="font-size: 1.2em;" class="fa fa-home"></i></a></li>\n <li><a href="/osint-network-defenders/" data-toggle="tooltip" data-placement="bottom" title="Defend"><i style="font-size: 1.2em;" class="fa fa-shield" aria-hidden="true"></i></a></li>\n <li><a href="/footprinting-reconnaissance/" data-placement="bottom" data-toggle="tooltip" title="Learn"><i style="font-size: 1.2em;" class="fa fa-mortar-board" aria-hidden="true"></i></a></li>\n <li><a href="https://hackertarget.com/" data-toggle="tooltip" title="Online Vulnerability Scanners"><i style="font-size: 1.2em; color: #00CC00;" class="fa fa-bullseye"></i></a></li>\n </ul>\n </nav>\n </div>\n </div>\n\n\n\n\n <div class="cover-container" style="max-width: 900px;">\n <div class="inner cover">\n <h1 class="cover-heading" style="margin-top: 100px;">dns recon & research, find & lookup dns records</h1>\n<p class="lead">\n<div id="hideform">\n<form role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="XYxKkbdJJrio6VMqowCdykwpM4mAflKkF9BcKFbLdmPbB3lwXArEVJvTPNpIz50l">\n <div class="form-group">\n<div class="col-md-2"></div><div class="col-md-6">\n\n<input class="form-control" type="text" placeholder="exampledomain.com" name="targetip" id="regularInput" autofocus>\n\n<input type="hidden" name="user" value="free">\n</div></div>\n<div align="left" id="formsubmit"><button type="submit" class="btn btn-default">Search <span class="glyphicon glyphicon-chevron-right"></span></button></div>\n</form></div></div>\n<div class="row"><div class="col-md-2"></div><div class="col-md-8">\n<div id="showloading" style="color: #fff;">Loading...<br>\n<div class="progress">\n<div class="progress-bar progress-bar-success progress-bar-striped active" role="progressbar" aria-valuenow="45" aria-valuemin="0" aria-valuemax="100" style="width: 100%">\n</div></div></div></div></div></div>\n</P>\n\n<div class="row"><div class="col-md-12" style="padding: 80px;">\n\n</div></div>\n\n<p class="lead" style="margin-top: 40px; margin-bottom: 30px;">DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.</p>\n\n </div>\n\n <p style="color: #777; margin-top: 40px;">this is a <a href="https://hackertarget.com/" title="Online Vulnerability Scanners"><button type="button" class="btn btn-danger btn-xs">HackerTarget.com</button></a> project</p>\n\n\n <div style="margin-top: 160px;" class="container">\n <div class="row">\n <div class="col-lg-12 text-center">\n <h2 class="section-heading text-uppercase"></h2>\n <h3 class="section-subheading text-muted">Open Source Intelligence for Networks</h3>\n </div>\n </div>\n <div style="margin-top: 30px;" class="row text-center">\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-user-secret fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Attack</h4>\n <p class="text-muted">The ability to quickly identify the attack surface is essential. Whether you are penetration testing or chasing bug bounties.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-shield fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Defend</h4>\n <p class="text-muted">Network defenders benefit from passive reconnaissance in a number of ways. With analysis informing information security strategy.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-mortar-board fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Learn</h4>\n <p class="text-muted">Understanding network based OSINT helps information technologists to better operate, assess and manage the network.</p>\n </div>\n </div>\n </div>\n\n\n\n\n <div class="container" style="background-color: #474747; margin-top: 180px; padding-bottom: 80px;"><div class="col-md-2"></div><div class="col-md-8">\n\n <span class="glyphicon glyphicon-trash" style="font-size: 4em; line-height: 5.5em;"></span>\n<p style="font-size: 1.7em; line-height: 1.9em; margin-bottom: 80px;">Map an organizations attack surface with a virtual <i>dumpster dive*</i> of the DNS records associated with the target organization.</p>\n<p style="font-size: 1.2em; color: #fff;">*DUMPSTER DIVING: The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information.</p>\n</div> </div>\n\n\n<div class="container" style="text-align: left; margin-top: 80px; margin-bottom: 80px;">\n\n<h2 style="font-size: 1.8em;">Frequently Asked Questions</h2>\n\n<h4 style="margin-top: 30px;">How can I take my security assessments to the next level?</h4>\n\n<p>The company behind DNSDumpster is <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> where we provide online hosted access to trusted open source security vulnerability scanners and network intelligence tools.</P><P>Save time and headaches by incorporating our attack surface discovery into your vulnerability assessment process.</p><P style="text-align: center; padding: 30px;"><a href="https://hackertarget.com/" title="HackerTarget.com | Online Security Testing and Open Source Intelligence"><img src="https://hackertarget.com/wp-content/uploads/2019/09/know-your-network-tools.png" alt="HackerTarget.com | Online Security Testing and Open Source Intelligence"></a></p>\n\n<h4>What data does DNSDumpster use?</h4>\n\n<p>No brute force subdomain enumeration is used as is common in dns recon tools that enumerate subdomains. We use open source intelligence resources to query for related domain data. It is then compiled into an actionable resource for both attackers and defenders of Internet facing systems.</P>\n<P>More than a simple <a href="https://hackertarget.com/dns-lookup/" title="Online DNS Lookup">DNS lookup</a> this tool will discover those hard to find sub-domains and web hosts. The search relies on data from our crawls of the Alexa Top 1 Million sites, Search Engines, Common Crawl, Certificate Transparency, Max Mind, Team Cymru, Shodan and <a href="https://scans.io/" style="text-decoration: underline;">scans.io</a>.</P>\n\n<h4>I have hit the host limit, do you have a PRO option?</h4>\n\n<P>Over at <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> there\'s a tool we call <a href="https://hackertarget.com/domain-profiler/">domain profiler</a>. This compiles data similiar to DNSDumpster; with additional data discovery. Queries available are based on the membership plan with the number of results (subdomains) being unlimited. With a STARTER membership you have access to the domain profiler tool for 12 months. Once the years membership expires you will revert to BASIC member status, however access to Domain Profiler and Basic Nmap scans continue. The BASIC access does not expire.</P>\n\n<h4>What are some other resources and tools for learning more?</h4>\n\n<P>There are some great open source recon frameworks that have been developed over the past couple of years. In addition tools such as <b>Metasploit</b> and <b>Nmap</b> include various modules for enumerating DNS. Check our <a href="https://dnsdumpster.com/footprinting-reconnaissance/">Getting Started with Footprinting</a> for more information.</P>\n\n</div>\n\n\n</div></div>\n</div></div>\n\n<footer>\n<div class="row" style="background-color: #1e1e1e; padding-top: 40px; padding-bottom: 20px;"><div class="container">\n<div class="col-md-6 col-sm-12 right-border" style="text-align: center;">\n<div class="footer-about" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">About</h2>\n<p style="margin-top: 20px;">At <a href="https://hackertarget.com/">hackertarget.com</a>, we have been scanning the Internet since 2007. Our vulnerability scanners now reach millions of IP addresses every year. We work to raise awareness of the value in open source security solutions.</p>\n</div>\n</div>\n<div class="col-md-6 col-sm-12">\n<div class="contact-info" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">Stay in Touch</h2>\n\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-envelope"></i> dnsdumpster@gmail.com</p>\n</div>\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-twitter"></i> <a href="https://twitter.com/hackertarget/">@hackertarget</a></p>\n</div>\n<!-- Begin MailChimp Signup Form -->\n<link href="https://cdn-images.mailchimp.com/embedcode/horizontal-slim-10_7.css" rel="stylesheet" type="text/css">\n<style type="text/css">\n #mc_embed_signup{background:#1e1e1e; clear:left; font:14px Helvetica,Arial,sans-serif; width:100%;}\n /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.\n We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */\n </style>\n <div id="mc_embed_signup">\n <form action="https://dnsdumpster.us17.list-manage.com/subscribe/post?u=3cbc62d931a69e74b2c856f1a&amp;id=532c46ab39" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate>\n <div id="mc_embed_signup_scroll" style="text-align: left;">\n\n <input type="email" value="" name="EMAIL" class="email" id="mce-EMAIL" placeholder="email address" required>\n <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->\n <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_3cbc62d931a69e74b2c856f1a_532c46ab39" tabindex="-1" value=""></div><br>\n <div class="clear" style="margin-top: 5px;"><input type="submit" style="background-color: #00CC00;" value="Subscribe to our List" name="subscribe" id="mc-embedded-subscribe" class="button"> <span style="font-size: 0.8em;">Low volume Updates and News</a></div>\n </div>\n </form>\n </div>\n\n <!--End mc_embed_signup-->\n\n</div>\n</div>\n</div>\n<div class="clearfix"></div>\n<div class="copyright" style="background-color: #1e1e1e; margin-top: 20px;">\n<p>Copyright &copy; 2023 Hacker Target Pty Ltd</p>\n</div>\n</div>\n</div>\n</div>\n</footer>\n </div>\n </div>\n </div>\n </div>\n\n\n\n\n</div></div>\n\n <!-- Bootstrap core JavaScript\n ================================================== -->\n <!-- Placed at the end of the document so the pages load faster -->\n <script src="https://dnsdumpster.com/static/js/jquery-1.12.4.min.js"></script>\n <script src="/static/js/bootstrap.min.js"></script>\n\n\n\n<script type="text/javascript">\n $(document).ready(function() {\n$(\'[data-toggle="tooltip"]\').tooltip({\'placement\': \'top\'});\n\n$("body").on(\'DOMSubtreeModified\', ".modal-content", function() {\n $(".modal-heading").hide();\n $(".modal-content").show();\n});\n\n $(\'body\').on(\'hidden.bs.modal\', \'.modal\', function () {\n $(this).removeData(\'bs.modal\');\n });\n\n }); //END $(document).ready()\n\n\n$(\'a.external\').on(\'click\', function(e) {\n e.preventDefault();\n $(".modal-heading").show();\n $(".modal-content").hide();\n\n\n var url = $(this).attr(\'href\');\n $(".modal-body").html(\'<iframe id="myiframe" style="background-color: #ccc;" width="100%" height="100%" frameborder="0" scrolling="yes" allowtransparency="true" src="\'+url+\'"></iframe>\');\n });\n\n \n\n\n $(\'#myModal\').on(\'show.bs.modal\', function () {\n $(this).find(\'.modal-dialog\').css({\n width:\'80%\', //choose your width\n height:\'80%\',\n \'padding\':\'5\'\n });\n $(this).find(\'.modal-content\').css({\n height:\'100%\',\n \'border-radius\':\'0\',\n \'padding\':\'15\'\n });\n $(this).find(\'.modal-body\').html(null);\n $(this).find(\'.modal-body\').css({\n width:\'auto\',\n height:\'100%\',\n \'padding\':\'5\'\n });\n })\n\n </script>\n\n<script>\n$(document).ready(function(){\n $("#showloading").hide();\n $("#formsubmit").click(function(){\n $("#hideform").hide();\n $("#showloading").show();\n });\n\n});\n</script>\n<!-- Google tag (gtag.js) -->\n<script async src="https://www.googletagmanager.com/gtag/js?id=G-FPGN9YXFNE"></script>\n<script>\n window.dataLayer = window.dataLayer || [];\n function gtag(){dataLayer.push(arguments);}\n gtag(\'js\', new Date());\n\n gtag(\'config\', \'G-FPGN9YXFNE\');\n</script>\n </body>\n</html>\n',
9
+ content=b'<!DOCTYPE html>\n<html lang="en">\n <head>\n\n <meta charset="utf-8">\n <meta http-equiv="X-UA-Compatible" content="IE=edge">\n<meta name="google-site-verification" content="vAWNZCy-5XAPGRgA2_NY5HictfnByvgpqOLQUAmVZW0" />\n <meta name="viewport" content="width=device-width, initial-scale=1">\n <meta name="description" content="Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.">\n <meta name="author" content="">\n <link rel="icon" href="/static/favicon.ico">\n <title>DNSdumpster.com - dns recon and research, find and lookup dns records</title>\n\n\n <!-- Bootstrap core CSS -->\n <link href="/static/css/bootstrap.min.css" rel="stylesheet">\n <link href="/static/font-awesome/css/font-awesome.min.css" rel="stylesheet">\n\n <!-- Custom styles for this template -->\n <link href="/static/cover.css?v=1.4" rel="stylesheet">\n\n </head>\n\n <body>\n\n <div class="site-wrapper">\n <div class="site-wrapper-inner">\n<!-- Section 1 -->\n<section id="intro" data-speed="6" data-type="background">\n <div class="container">\n\n <div class="masthead clearfix">\n <div class="container inner">\n <nav>\n <ul class="nav masthead-nav">\n <li><a href="https://dnsdumpster.com/" data-toggle="tooltip" data-placement="bottom" title="Home"><i style="font-size: 1.2em;" class="fa fa-home"></i></a></li>\n <li><a href="/osint-network-defenders/" data-toggle="tooltip" data-placement="bottom" title="Defend"><i style="font-size: 1.2em;" class="fa fa-shield" aria-hidden="true"></i></a></li>\n <li><a href="/footprinting-reconnaissance/" data-placement="bottom" data-toggle="tooltip" title="Learn"><i style="font-size: 1.2em;" class="fa fa-mortar-board" aria-hidden="true"></i></a></li>\n <li><a href="https://hackertarget.com/" data-toggle="tooltip" title="Online Vulnerability Scanners"><i style="font-size: 1.2em; color: #00CC00;" class="fa fa-bullseye"></i></a></li>\n </ul>\n </nav>\n </div>\n </div>\n\n\n\n\n <div class="cover-container" style="max-width: 900px;">\n <div class="inner cover">\n <h1 class="cover-heading" style="margin-top: 100px;">dns recon & research, find & lookup dns records</h1>\n<p class="lead">\n<div id="hideform">\n<form role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="XYxKkbdJJrio6VMqowCdykwpM4mAflKkF9BcKFbLdmPbB3lwXArEVJvTPNpIz50l">\n <div class="form-group">\n<div class="col-md-2"></div><div class="col-md-6">\n\n<input class="form-control" type="text" placeholder="exampledomain.com" name="targetip" id="regularInput" autofocus>\n\n<input type="hidden" name="user" value="free">\n</div></div>\n<div align="left" id="formsubmit"><button type="submit" class="btn btn-default">Search <span class="glyphicon glyphicon-chevron-right"></span></button></div>\n</form></div></div>\n<div class="row"><div class="col-md-2"></div><div class="col-md-8">\n<div id="showloading" style="color: #fff;">Loading...<br>\n<div class="progress">\n<div class="progress-bar progress-bar-success progress-bar-striped active" role="progressbar" aria-valuenow="45" aria-valuemin="0" aria-valuemax="100" style="width: 100%">\n</div></div></div></div></div></div>\n</P>\n\n<div class="row"><div class="col-md-12" style="padding: 80px;">\n\n</div></div>\n\n<p class="lead" style="margin-top: 40px; margin-bottom: 30px;">DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.</p>\n\n </div>\n\n <p style="color: #777; margin-top: 40px;">this is a <a href="https://hackertarget.com/" title="Online Vulnerability Scanners"><button type="button" class="btn btn-danger btn-xs">HackerTarget.com</button></a> project</p>\n\n\n <div style="margin-top: 160px;" class="container">\n <div class="row">\n <div class="col-lg-12 text-center">\n <h2 class="section-heading text-uppercase"></h2>\n <h3 class="section-subheading text-muted">Open Source Intelligence for Networks</h3>\n </div>\n </div>\n <div style="margin-top: 30px;" class="row text-center">\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-user-secret fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Attack</h4>\n <p class="text-muted">The ability to quickly identify the attack surface is essential. Whether you are penetration testing or chasing bug bounties.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-shield fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Defend</h4>\n <p class="text-muted">Network defenders benefit from passive reconnaissance in a number of ways. With analysis informing information security strategy.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-mortar-board fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Learn</h4>\n <p class="text-muted">Understanding network based OSINT helps information technologists to better operate, assess and manage the network.</p>\n </div>\n </div>\n </div>\n\n\n\n\n <div class="container" style="background-color: #474747; margin-top: 180px; padding-bottom: 80px;"><div class="col-md-2"></div><div class="col-md-8">\n\n <span class="glyphicon glyphicon-trash" style="font-size: 4em; line-height: 5.5em;"></span>\n<p style="font-size: 1.7em; line-height: 1.9em; margin-bottom: 80px;">Map an organizations attack surface with a virtual <i>dumpster dive*</i> of the DNS records associated with the target organization.</p>\n<p style="font-size: 1.2em; color: #fff;">*DUMPSTER DIVING: The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information.</p>\n</div> </div>\n\n\n<div class="container" style="text-align: left; margin-top: 80px; margin-bottom: 80px;">\n\n<h2 style="font-size: 1.8em;">Frequently Asked Questions</h2>\n\n<h4 style="margin-top: 30px;">How can I take my security assessments to the next level?</h4>\n\n<p>The company behind DNSDumpster is <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> where we provide online hosted access to trusted open source security vulnerability scanners and network intelligence tools.</P><P>Save time and headaches by incorporating our attack surface discovery into your vulnerability assessment process.</p><P style="text-align: center; padding: 30px;"><a href="https://hackertarget.com/" title="HackerTarget.com | Online Security Testing and Open Source Intelligence"><img src="https://hackertarget.com/wp-content/uploads/2019/09/know-your-network-tools.png" alt="HackerTarget.com | Online Security Testing and Open Source Intelligence"></a></p>\n\n<h4>What data does DNSDumpster use?</h4>\n\n<p>No brute force subdomain enumeration is used as is common in dns recon tools that enumerate subdomains. We use open source intelligence resources to query for related domain data. It is then compiled into an actionable resource for both attackers and defenders of Internet facing systems.</P>\n<P>More than a simple <a href="https://hackertarget.com/dns-lookup/" title="Online DNS Lookup">DNS lookup</a> this tool will discover those hard to find sub-domains and web hosts. The search relies on data from our crawls of the Alexa Top 1 Million sites, Search Engines, Common Crawl, Certificate Transparency, Max Mind, Team Cymru, Shodan and <a href="https://scans.io/" style="text-decoration: underline;">scans.io</a>.</P>\n\n<h4>I have hit the host limit, do you have a PRO option?</h4>\n\n<P>Over at <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> there\'s a tool we call <a href="https://hackertarget.com/domain-profiler/">domain profiler</a>. This compiles data similar to DNSDumpster; with additional data discovery. Queries available are based on the membership plan with the number of results (subdomains) being unlimited. With a STARTER membership you have access to the domain profiler tool for 12 months. Once the years membership expires you will revert to BASIC member status, however access to Domain Profiler and Basic Nmap scans continue. The BASIC access does not expire.</P>\n\n<h4>What are some other resources and tools for learning more?</h4>\n\n<P>There are some great open source recon frameworks that have been developed over the past couple of years. In addition tools such as <b>Metasploit</b> and <b>Nmap</b> include various modules for enumerating DNS. Check our <a href="https://dnsdumpster.com/footprinting-reconnaissance/">Getting Started with Footprinting</a> for more information.</P>\n\n</div>\n\n\n</div></div>\n</div></div>\n\n<footer>\n<div class="row" style="background-color: #1e1e1e; padding-top: 40px; padding-bottom: 20px;"><div class="container">\n<div class="col-md-6 col-sm-12 right-border" style="text-align: center;">\n<div class="footer-about" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">About</h2>\n<p style="margin-top: 20px;">At <a href="https://hackertarget.com/">hackertarget.com</a>, we have been scanning the Internet since 2007. Our vulnerability scanners now reach millions of IP addresses every year. We work to raise awareness of the value in open source security solutions.</p>\n</div>\n</div>\n<div class="col-md-6 col-sm-12">\n<div class="contact-info" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">Stay in Touch</h2>\n\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-envelope"></i> dnsdumpster@gmail.com</p>\n</div>\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-twitter"></i> <a href="https://twitter.com/hackertarget/">@hackertarget</a></p>\n</div>\n<!-- Begin MailChimp Signup Form -->\n<link href="https://cdn-images.mailchimp.com/embedcode/horizontal-slim-10_7.css" rel="stylesheet" type="text/css">\n<style type="text/css">\n #mc_embed_signup{background:#1e1e1e; clear:left; font:14px Helvetica,Arial,sans-serif; width:100%;}\n /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.\n We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */\n </style>\n <div id="mc_embed_signup">\n <form action="https://dnsdumpster.us17.list-manage.com/subscribe/post?u=3cbc62d931a69e74b2c856f1a&amp;id=532c46ab39" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate>\n <div id="mc_embed_signup_scroll" style="text-align: left;">\n\n <input type="email" value="" name="EMAIL" class="email" id="mce-EMAIL" placeholder="email address" required>\n <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->\n <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_3cbc62d931a69e74b2c856f1a_532c46ab39" tabindex="-1" value=""></div><br>\n <div class="clear" style="margin-top: 5px;"><input type="submit" style="background-color: #00CC00;" value="Subscribe to our List" name="subscribe" id="mc-embedded-subscribe" class="button"> <span style="font-size: 0.8em;">Low volume Updates and News</a></div>\n </div>\n </form>\n </div>\n\n <!--End mc_embed_signup-->\n\n</div>\n</div>\n</div>\n<div class="clearfix"></div>\n<div class="copyright" style="background-color: #1e1e1e; margin-top: 20px;">\n<p>Copyright &copy; 2023 Hacker Target Pty Ltd</p>\n</div>\n</div>\n</div>\n</div>\n</footer>\n </div>\n </div>\n </div>\n </div>\n\n\n\n\n</div></div>\n\n <!-- Bootstrap core JavaScript\n ================================================== -->\n <!-- Placed at the end of the document so the pages load faster -->\n <script src="https://dnsdumpster.com/static/js/jquery-1.12.4.min.js"></script>\n <script src="/static/js/bootstrap.min.js"></script>\n\n\n\n<script type="text/javascript">\n $(document).ready(function() {\n$(\'[data-toggle="tooltip"]\').tooltip({\'placement\': \'top\'});\n\n$("body").on(\'DOMSubtreeModified\', ".modal-content", function() {\n $(".modal-heading").hide();\n $(".modal-content").show();\n});\n\n $(\'body\').on(\'hidden.bs.modal\', \'.modal\', function () {\n $(this).removeData(\'bs.modal\');\n });\n\n }); //END $(document).ready()\n\n\n$(\'a.external\').on(\'click\', function(e) {\n e.preventDefault();\n $(".modal-heading").show();\n $(".modal-content").hide();\n\n\n var url = $(this).attr(\'href\');\n $(".modal-body").html(\'<iframe id="myiframe" style="background-color: #ccc;" width="100%" height="100%" frameborder="0" scrolling="yes" allowtransparency="true" src="\'+url+\'"></iframe>\');\n });\n\n \n\n\n $(\'#myModal\').on(\'show.bs.modal\', function () {\n $(this).find(\'.modal-dialog\').css({\n width:\'80%\', //choose your width\n height:\'80%\',\n \'padding\':\'5\'\n });\n $(this).find(\'.modal-content\').css({\n height:\'100%\',\n \'border-radius\':\'0\',\n \'padding\':\'15\'\n });\n $(this).find(\'.modal-body\').html(null);\n $(this).find(\'.modal-body\').css({\n width:\'auto\',\n height:\'100%\',\n \'padding\':\'5\'\n });\n })\n\n </script>\n\n<script>\n$(document).ready(function(){\n $("#showloading").hide();\n $("#formsubmit").click(function(){\n $("#hideform").hide();\n $("#showloading").show();\n });\n\n});\n</script>\n<!-- Google tag (gtag.js) -->\n<script async src="https://www.googletagmanager.com/gtag/js?id=G-FPGN9YXFNE"></script>\n<script>\n window.dataLayer = window.dataLayer || [];\n function gtag(){dataLayer.push(arguments);}\n gtag(\'js\', new Date());\n\n gtag(\'config\', \'G-FPGN9YXFNE\');\n</script>\n </body>\n</html>\n',
10
10
  )
11
11
  module_test.httpx_mock.add_response(
12
12
  url="https://dnsdumpster.com/",
13
13
  method="POST",
14
- content=b'<!DOCTYPE html>\n<html lang="en">\n <head>\n\n <meta charset="utf-8">\n <meta http-equiv="X-UA-Compatible" content="IE=edge">\n<meta name="google-site-verification" content="vAWNZCy-5XAPGRgA2_NY5HictfnByvgpqOLQUAmVZW0" />\n <meta name="viewport" content="width=device-width, initial-scale=1">\n <meta name="description" content="Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.">\n <meta name="author" content="">\n <link rel="icon" href="/static/favicon.ico">\n <title>DNSdumpster.com - dns recon and research, find and lookup dns records</title>\n\n\n <!-- Bootstrap core CSS -->\n <link href="/static/css/bootstrap.min.css" rel="stylesheet">\n <link href="/static/font-awesome/css/font-awesome.min.css" rel="stylesheet">\n\n <!-- Custom styles for this template -->\n <link href="/static/cover.css?v=1.4" rel="stylesheet">\n\n </head>\n\n <body>\n\n <div class="site-wrapper">\n <div class="site-wrapper-inner">\n<!-- Section 1 -->\n<section id="intro" data-speed="6" data-type="background">\n <div class="container">\n\n <div class="masthead clearfix">\n <div class="container inner">\n <nav>\n <ul class="nav masthead-nav">\n <li><a href="https://dnsdumpster.com/" data-toggle="tooltip" data-placement="bottom" title="Home"><i style="font-size: 1.2em;" class="fa fa-home"></i></a></li>\n <li><a href="/osint-network-defenders/" data-toggle="tooltip" data-placement="bottom" title="Defend"><i style="font-size: 1.2em;" class="fa fa-shield" aria-hidden="true"></i></a></li>\n <li><a href="/footprinting-reconnaissance/" data-placement="bottom" data-toggle="tooltip" title="Learn"><i style="font-size: 1.2em;" class="fa fa-mortar-board" aria-hidden="true"></i></a></li>\n <li><a href="https://hackertarget.com/" data-toggle="tooltip" title="Online Vulnerability Scanners"><i style="font-size: 1.2em; color: #00CC00;" class="fa fa-bullseye"></i></a></li>\n </ul>\n </nav>\n </div>\n </div>\n\n\n\n\n <div class="cover-container" style="max-width: 900px;">\n <div class="inner cover">\n <h1 class="cover-heading" style="margin-top: 100px;">dns recon & research, find & lookup dns records</h1>\n<p class="lead">\n<div id="hideform">\n<form role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS">\n <div class="form-group">\n<div class="col-md-2"></div><div class="col-md-6">\n\n<input class="form-control" type="text" placeholder="exampledomain.com" name="targetip" id="regularInput" autofocus>\n\n<input type="hidden" name="user" value="free">\n</div></div>\n<div align="left" id="formsubmit"><button type="submit" class="btn btn-default">Search <span class="glyphicon glyphicon-chevron-right"></span></button></div>\n</form></div></div>\n<div class="row"><div class="col-md-2"></div><div class="col-md-8">\n<div id="showloading" style="color: #fff;">Loading...<br>\n<div class="progress">\n<div class="progress-bar progress-bar-success progress-bar-striped active" role="progressbar" aria-valuenow="45" aria-valuemin="0" aria-valuemax="100" style="width: 100%">\n</div></div></div></div></div></div>\n</P>\n\n<div class="row"><div class="col-md-12" style="padding: 80px;">\n\n<p><h4 style="color: #00CC00; text-align: left; font-size: 1.5em; line-height: 2.7em;">Showing results for <span style="font-weight: 700;">blacklanternsecurity.com</span></h4></p>\n<div style="text-align: right; font-size: 1em;"><a href="#dnsanchor"><span class="label label-default">DNS Servers</span></a> <a href="#mxanchor"><span class="label label-default">MX Records</span></a> <a href="#txtanchor"><span class="label label-default">TXT Records</span></a> <a href="#hostanchor"><span class="label label-default">Host (A) Records</span></a> <a href="#domainmap"><span class="label label-default">Domain Map</span></a></div><div class="clearfix" style="height: 30px;"></div>\n<div class="container">\n <div class="row">\n <div class="col-md-4">\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left; padding-left: 30px; padding-bottom: 20px;">Hosting (IP block owners)</P>\n<canvas id="hosting" height="380" width="300"></canvas></div>\n <div class="col-md-8">\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left; padding-left: 30px;">GeoIP of Host Locations</P>\n <div id="world-map" style="width: 480px; height: 380px"></div>\n</div> </div>\n</div>\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="dnsanchor"></a>DNS Servers</P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; border-color: #777;">\n \n <tr><td class="col-md-4">ns01.domaincontrol.com.<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=ns01.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers from IP address (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/zonetransfer/?q=ns01.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-log-in" data-toggle="tooltip" data-placement="top" title="Attempt Zone Transfer (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=97.74.100.1" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path to IP address using MTR (Active)"></span></a> <a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/findshareddns/?q=ns01.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-cloud-download" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this DNS server"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="97.74.100.0/23" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="97.74.100.1" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n</td><td class="col-md-3">97.74.100.1<br><span style="font-size: 0.9em; color: #eee;">ns01.domaincontrol.com</span></td><td class="col-md-3">GODADDY-DNS<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">ns02.domaincontrol.com.<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=ns02.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers from IP address (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/zonetransfer/?q=ns02.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-log-in" data-toggle="tooltip" data-placement="top" title="Attempt Zone Transfer (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=173.201.68.1" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path to IP address using MTR (Active)"></span></a> <a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/findshareddns/?q=ns02.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-cloud-download" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this DNS server"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="173.201.68.0/23" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="173.201.68.1" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n</td><td class="col-md-3">173.201.68.1<br><span style="font-size: 0.9em; color: #eee;">ns02.domaincontrol.com</span></td><td class="col-md-3">GODADDY-DNS<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n </table>\n</div>\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="mxanchor"></a>MX Records <span style="font-size: 0.8em; color: #777;">** This is where email for the domain goes...</P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; font-family: \'Courier New\', Courier, monospace;">\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com.mail.protection.outlook.com.<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=104.47.55.138" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=104.47.55.138" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="104.40.0.0/13" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="104.47.55.138" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n</td><td class="col-md-3">104.47.55.138<br><span style="font-size: 0.9em; color: #eee;">mail-bn8nam120138.inbound.protection.outlook.com</span></td><td class="col-md-3">MICROSOFT-CORP-MSN-AS-BLOCK<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n </table>\n</div>\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="txtanchor"></a>TXT Records <span style="font-size: 0.8em; color: #777;">** Find more hosts in Sender Policy Framework (SPF) configurations</span></P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; font-family: \'Courier New\', Courier, monospace;">\n\n<tr><td>&quot;MS=ms26206678&quot;</td></tr>\n\n<tr><td>&quot;v=spf1 ip4:50.240.76.25 include:spf.protection.outlook.com -all&quot;</td></tr>\n\n<tr><td>&quot;google-site-verification=O_PoQFTGJ_hZ9LqfNT9OEc0KPFERKHQ_1t1m0YTx_1E&quot;</td></tr>\n\n<tr><td>&quot;google-site-verification=7XKUMxJSTHBSzdvT7gH47jLRjNAS76nrEfXmzhR_DO4&quot;</td></tr>\n\n</table>\n</div>\n\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="hostanchor"></a>Host Records (A) <span style="font-size: 0.8em; color: #777;">** this data may not be current as it uses a static database (updated monthly)</span> </P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; font-family: \'Courier New\', Courier, monospace;">\n\n \n <tr><td class="col-md-4">blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=185.199.108.153" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=185.199.108.153" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="185.199.108.0/24" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="185.199.108.153" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="HTTP Server found in Global Scan data (Passive)">GitHub.com</span>\n\n\n\n\n\n\n\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP TECH: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="Apps / Technologies found in Global Scan data (Passive)">varnish</span>\n\n\n\n</td><td class="col-md-3">185.199.108.153<br><span style="font-size: 0.9em; color: #eee;">cdn-185-199-108-153.github.com</span></td><td class="col-md-3">FASTLY<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=143.244.156.80" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=143.244.156.80" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="143.244.144.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="143.244.156.80" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n<br><span style="font-size: 0.8em; color: #bbb;">SSH: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="SSH Server found in Global Scan data (Passive)">SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3</span>\n\n\n\n\n\n\n\n</td><td class="col-md-3">143.244.156.80<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=64.227.8.231" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=64.227.8.231" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="64.227.0.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="64.227.8.231" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="HTTP Server found in Global Scan data (Passive)">Apache/2.4.29 (Ubuntu)</span>\n\n\n\n\n\n\n\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP TECH: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="Apps / Technologies found in Global Scan data (Passive)">Ubuntu<br>Apache,2.4.29</span>\n\n\n\n</td><td class="col-md-3">64.227.8.231<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=192.34.56.157" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=192.34.56.157" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.34.56.0/24" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.34.56.157" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">192.34.56.157<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=192.241.216.208" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=192.241.216.208" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.241.192.0/19" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.241.216.208" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">192.241.216.208<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=167.71.95.71" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=167.71.95.71" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="167.71.80.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="167.71.95.71" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">167.71.95.71<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=157.245.247.197" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=157.245.247.197" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="157.245.240.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="157.245.247.197" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">157.245.247.197<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n </table>\n<br>\n\n\n\n<div style="margin: 30px;" align="center"><a href="/static/asdf.blacklanternsecurity.com-202305190301.xlsx"><button type="button" class="btn btn-default"><span class="glyphicon glyphicon-download" aria-hidden="true"></span> Download .xlsx of Hosts</button></a> <a href="/static/asdf.blacklanternsecurity.com-202305190301.html" target="_blank"><button type="button" class="btn btn-default"><span class="glyphicon glyphicon-download" aria-hidden="true"></span> View Graph (beta)</button></div>\n\n<br>\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="domainmap"></a>Mapping the domain<span style="font-size: 0.8em; color: #777;"> ** click for full size image</span> </P>\n<p>\n<a href="/static/asdf.blacklanternsecurity.com.png"><img style="max-width: 100%;" class="img-responsive" src="/static/asdf.blacklanternsecurity.com.png"></a>\n</p>\n</div>\n\n</div></div>\n\n<p class="lead" style="margin-top: 40px; margin-bottom: 30px;">DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.</p>\n\n </div>\n\n <p style="color: #777; margin-top: 40px;">this is a <a href="https://hackertarget.com/" title="Online Vulnerability Scanners"><button type="button" class="btn btn-danger btn-xs">HackerTarget.com</button></a> project</p>\n\n\n <div style="margin-top: 160px;" class="container">\n <div class="row">\n <div class="col-lg-12 text-center">\n <h2 class="section-heading text-uppercase"></h2>\n <h3 class="section-subheading text-muted">Open Source Intelligence for Networks</h3>\n </div>\n </div>\n <div style="margin-top: 30px;" class="row text-center">\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-user-secret fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Attack</h4>\n <p class="text-muted">The ability to quickly identify the attack surface is essential. Whether you are penetration testing or chasing bug bounties.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-shield fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Defend</h4>\n <p class="text-muted">Network defenders benefit from passive reconnaissance in a number of ways. With analysis informing information security strategy.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-mortar-board fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Learn</h4>\n <p class="text-muted">Understanding network based OSINT helps information technologists to better operate, assess and manage the network.</p>\n </div>\n </div>\n </div>\n\n\n\n\n <div class="container" style="background-color: #474747; margin-top: 180px; padding-bottom: 80px;"><div class="col-md-2"></div><div class="col-md-8">\n\n <span class="glyphicon glyphicon-trash" style="font-size: 4em; line-height: 5.5em;"></span>\n<p style="font-size: 1.7em; line-height: 1.9em; margin-bottom: 80px;">Map an organizations attack surface with a virtual <i>dumpster dive*</i> of the DNS records associated with the target organization.</p>\n<p style="font-size: 1.2em; color: #fff;">*DUMPSTER DIVING: The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information.</p>\n</div> </div>\n\n\n<div class="container" style="text-align: left; margin-top: 80px; margin-bottom: 80px;">\n\n<h2 style="font-size: 1.8em;">Frequently Asked Questions</h2>\n\n<h4 style="margin-top: 30px;">How can I take my security assessments to the next level?</h4>\n\n<p>The company behind DNSDumpster is <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> where we provide online hosted access to trusted open source security vulnerability scanners and network intelligence tools.</P><P>Save time and headaches by incorporating our attack surface discovery into your vulnerability assessment process.</p><P style="text-align: center; padding: 30px;"><a href="https://hackertarget.com/" title="HackerTarget.com | Online Security Testing and Open Source Intelligence"><img src="https://hackertarget.com/wp-content/uploads/2019/09/know-your-network-tools.png" alt="HackerTarget.com | Online Security Testing and Open Source Intelligence"></a></p>\n\n<h4>What data does DNSDumpster use?</h4>\n\n<p>No brute force subdomain enumeration is used as is common in dns recon tools that enumerate subdomains. We use open source intelligence resources to query for related domain data. It is then compiled into an actionable resource for both attackers and defenders of Internet facing systems.</P>\n<P>More than a simple <a href="https://hackertarget.com/dns-lookup/" title="Online DNS Lookup">DNS lookup</a> this tool will discover those hard to find sub-domains and web hosts. The search relies on data from our crawls of the Alexa Top 1 Million sites, Search Engines, Common Crawl, Certificate Transparency, Max Mind, Team Cymru, Shodan and <a href="https://scans.io/" style="text-decoration: underline;">scans.io</a>.</P>\n\n<h4>I have hit the host limit, do you have a PRO option?</h4>\n\n<P>Over at <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> there\'s a tool we call <a href="https://hackertarget.com/domain-profiler/">domain profiler</a>. This compiles data similiar to DNSDumpster; with additional data discovery. Queries available are based on the membership plan with the number of results (subdomains) being unlimited. With a STARTER membership you have access to the domain profiler tool for 12 months. Once the years membership expires you will revert to BASIC member status, however access to Domain Profiler and Basic Nmap scans continue. The BASIC access does not expire.</P>\n\n<h4>What are some other resources and tools for learning more?</h4>\n\n<P>There are some great open source recon frameworks that have been developed over the past couple of years. In addition tools such as <b>Metasploit</b> and <b>Nmap</b> include various modules for enumerating DNS. Check our <a href="https://dnsdumpster.com/footprinting-reconnaissance/">Getting Started with Footprinting</a> for more information.</P>\n\n</div>\n\n\n\n<!-- Modal -->\n<div class="modal fade" id="myModal" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">\n <div class="modal-dialog">\n<div class="modal-heading lds-facebook" style="margin-top: 200px;"><div></div><div></div><div></div></div>\n <div class="modal-content" style="background-color: #CCC; white-space: pre-wrap; padding: 20px; text-shadow: none; font-size: 1.2em; max-width: 1000px;">\n </div><!-- /.modal-content -->\n </div><!-- /.modal-dialog -->\n</div><!-- /.modal -->\n\n</div></div>\n</div></div>\n\n<footer>\n<div class="row" style="background-color: #1e1e1e; padding-top: 40px; padding-bottom: 20px;"><div class="container">\n<div class="col-md-6 col-sm-12 right-border" style="text-align: center;">\n<div class="footer-about" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">About</h2>\n<p style="margin-top: 20px;">At <a href="https://hackertarget.com/">hackertarget.com</a>, we have been scanning the Internet since 2007. Our vulnerability scanners now reach millions of IP addresses every year. We work to raise awareness of the value in open source security solutions.</p>\n</div>\n</div>\n<div class="col-md-6 col-sm-12">\n<div class="contact-info" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">Stay in Touch</h2>\n\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-envelope"></i> dnsdumpster@gmail.com</p>\n</div>\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-twitter"></i> <a href="https://twitter.com/hackertarget/">@hackertarget</a></p>\n</div>\n<!-- Begin MailChimp Signup Form -->\n<link href="https://cdn-images.mailchimp.com/embedcode/horizontal-slim-10_7.css" rel="stylesheet" type="text/css">\n<style type="text/css">\n #mc_embed_signup{background:#1e1e1e; clear:left; font:14px Helvetica,Arial,sans-serif; width:100%;}\n /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.\n We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */\n </style>\n <div id="mc_embed_signup">\n <form action="https://dnsdumpster.us17.list-manage.com/subscribe/post?u=3cbc62d931a69e74b2c856f1a&amp;id=532c46ab39" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate>\n <div id="mc_embed_signup_scroll" style="text-align: left;">\n\n <input type="email" value="" name="EMAIL" class="email" id="mce-EMAIL" placeholder="email address" required>\n <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->\n <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_3cbc62d931a69e74b2c856f1a_532c46ab39" tabindex="-1" value=""></div><br>\n <div class="clear" style="margin-top: 5px;"><input type="submit" style="background-color: #00CC00;" value="Subscribe to our List" name="subscribe" id="mc-embedded-subscribe" class="button"> <span style="font-size: 0.8em;">Low volume Updates and News</a></div>\n </div>\n </form>\n </div>\n\n <!--End mc_embed_signup-->\n\n</div>\n</div>\n</div>\n<div class="clearfix"></div>\n<div class="copyright" style="background-color: #1e1e1e; margin-top: 20px;">\n<p>Copyright &copy; 2023 Hacker Target Pty Ltd</p>\n</div>\n</div>\n</div>\n</div>\n</footer>\n </div>\n </div>\n </div>\n </div>\n\n\n\n\n</div></div>\n\n <!-- Bootstrap core JavaScript\n ================================================== -->\n <!-- Placed at the end of the document so the pages load faster -->\n <script src="https://dnsdumpster.com/static/js/jquery-1.12.4.min.js"></script>\n <script src="/static/js/bootstrap.min.js"></script>\n\n\n<script src="/static/Chart.js"></script>\n <link rel="stylesheet" href="/static/jquery-jvectormap-2.0.1.css" type="text/css" media="screen"/>\n <script src="/static/jquery-jvectormap-2.0.1.min.js"></script>\n <script src="/static/jquery-jvectormap-world-mill-en.js"></script>\n\n <script type="text/javascript">\nvar barChartData = {\nlabels : [\n\n"GODADDY-DNS",\n\n"MICROSOFT-CORP-MSN-AS-BLOCK",\n\n"FASTLY",\n\n"DIGITALOCEAN-ASN",\n\n],\ndatasets : [\n{\nfillColor : "#ccc",\nstrokeColor : "#ccc",\ndata : [\n\n2,\n\n1,\n\n1,\n\n6,\n\n],\n}\n]\n}\n\nwindow.onload = function(){\nvar ctx = document.getElementById("hosting").getContext("2d");\nwindow.myBar = new Chart(ctx).Bar(barChartData, {\n});\n}\n</script>\n\n\n<script>\nvar gdpData = {\n\n"US" : 3,\n\n"United States" : 7,\n\n};\n $(function(){\n$(\'#world-map\').vectorMap({\n map: \'world_mill_en\',\n backgroundColor: \'#333333\',\n zoomButtons : false,\n series: {\n regions: [{\n values: gdpData,\n scale: [\'#00CC00\', \'#008400\'],\n normalizeFunction: \'polynomial\'\n }]\n },\n onRegionTipShow: function(e, el, code){\n if (typeof gdpData[code] !=="undefined"){\n el.html(el.html()+\' <br>Hosts Found : \'+gdpData[code]);\n } \n }\n});\n });\n </script>\n\n\n\n<script type="text/javascript">\n $(document).ready(function() {\n$(\'[data-toggle="tooltip"]\').tooltip({\'placement\': \'top\'});\n\n$("body").on(\'DOMSubtreeModified\', ".modal-content", function() {\n $(".modal-heading").hide();\n $(".modal-content").show();\n});\n\n $(\'body\').on(\'hidden.bs.modal\', \'.modal\', function () {\n $(this).removeData(\'bs.modal\');\n });\n\n }); //END $(document).ready()\n\n\n$(\'a.external\').on(\'click\', function(e) {\n e.preventDefault();\n $(".modal-heading").show();\n $(".modal-content").hide();\n\n\n var url = $(this).attr(\'href\');\n $(".modal-body").html(\'<iframe id="myiframe" style="background-color: #ccc;" width="100%" height="100%" frameborder="0" scrolling="yes" allowtransparency="true" src="\'+url+\'"></iframe>\');\n });\n\n \n\n\n $(\'#myModal\').on(\'show.bs.modal\', function () {\n $(this).find(\'.modal-dialog\').css({\n width:\'80%\', //choose your width\n height:\'80%\',\n \'padding\':\'5\'\n });\n $(this).find(\'.modal-content\').css({\n height:\'100%\',\n \'border-radius\':\'0\',\n \'padding\':\'15\'\n });\n $(this).find(\'.modal-body\').html(null);\n $(this).find(\'.modal-body\').css({\n width:\'auto\',\n height:\'100%\',\n \'padding\':\'5\'\n });\n })\n\n </script>\n\n<script>\n$(document).ready(function(){\n $("#showloading").hide();\n $("#formsubmit").click(function(){\n $("#hideform").hide();\n $("#showloading").show();\n });\n\n});\n</script>\n<!-- Google tag (gtag.js) -->\n<script async src="https://www.googletagmanager.com/gtag/js?id=G-FPGN9YXFNE"></script>\n<script>\n window.dataLayer = window.dataLayer || [];\n function gtag(){dataLayer.push(arguments);}\n gtag(\'js\', new Date());\n\n gtag(\'config\', \'G-FPGN9YXFNE\');\n</script>\n </body>\n</html>\n',
14
+ content=b'<!DOCTYPE html>\n<html lang="en">\n <head>\n\n <meta charset="utf-8">\n <meta http-equiv="X-UA-Compatible" content="IE=edge">\n<meta name="google-site-verification" content="vAWNZCy-5XAPGRgA2_NY5HictfnByvgpqOLQUAmVZW0" />\n <meta name="viewport" content="width=device-width, initial-scale=1">\n <meta name="description" content="Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.">\n <meta name="author" content="">\n <link rel="icon" href="/static/favicon.ico">\n <title>DNSdumpster.com - dns recon and research, find and lookup dns records</title>\n\n\n <!-- Bootstrap core CSS -->\n <link href="/static/css/bootstrap.min.css" rel="stylesheet">\n <link href="/static/font-awesome/css/font-awesome.min.css" rel="stylesheet">\n\n <!-- Custom styles for this template -->\n <link href="/static/cover.css?v=1.4" rel="stylesheet">\n\n </head>\n\n <body>\n\n <div class="site-wrapper">\n <div class="site-wrapper-inner">\n<!-- Section 1 -->\n<section id="intro" data-speed="6" data-type="background">\n <div class="container">\n\n <div class="masthead clearfix">\n <div class="container inner">\n <nav>\n <ul class="nav masthead-nav">\n <li><a href="https://dnsdumpster.com/" data-toggle="tooltip" data-placement="bottom" title="Home"><i style="font-size: 1.2em;" class="fa fa-home"></i></a></li>\n <li><a href="/osint-network-defenders/" data-toggle="tooltip" data-placement="bottom" title="Defend"><i style="font-size: 1.2em;" class="fa fa-shield" aria-hidden="true"></i></a></li>\n <li><a href="/footprinting-reconnaissance/" data-placement="bottom" data-toggle="tooltip" title="Learn"><i style="font-size: 1.2em;" class="fa fa-mortar-board" aria-hidden="true"></i></a></li>\n <li><a href="https://hackertarget.com/" data-toggle="tooltip" title="Online Vulnerability Scanners"><i style="font-size: 1.2em; color: #00CC00;" class="fa fa-bullseye"></i></a></li>\n </ul>\n </nav>\n </div>\n </div>\n\n\n\n\n <div class="cover-container" style="max-width: 900px;">\n <div class="inner cover">\n <h1 class="cover-heading" style="margin-top: 100px;">dns recon & research, find & lookup dns records</h1>\n<p class="lead">\n<div id="hideform">\n<form role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS">\n <div class="form-group">\n<div class="col-md-2"></div><div class="col-md-6">\n\n<input class="form-control" type="text" placeholder="exampledomain.com" name="targetip" id="regularInput" autofocus>\n\n<input type="hidden" name="user" value="free">\n</div></div>\n<div align="left" id="formsubmit"><button type="submit" class="btn btn-default">Search <span class="glyphicon glyphicon-chevron-right"></span></button></div>\n</form></div></div>\n<div class="row"><div class="col-md-2"></div><div class="col-md-8">\n<div id="showloading" style="color: #fff;">Loading...<br>\n<div class="progress">\n<div class="progress-bar progress-bar-success progress-bar-striped active" role="progressbar" aria-valuenow="45" aria-valuemin="0" aria-valuemax="100" style="width: 100%">\n</div></div></div></div></div></div>\n</P>\n\n<div class="row"><div class="col-md-12" style="padding: 80px;">\n\n<p><h4 style="color: #00CC00; text-align: left; font-size: 1.5em; line-height: 2.7em;">Showing results for <span style="font-weight: 700;">blacklanternsecurity.com</span></h4></p>\n<div style="text-align: right; font-size: 1em;"><a href="#dnsanchor"><span class="label label-default">DNS Servers</span></a> <a href="#mxanchor"><span class="label label-default">MX Records</span></a> <a href="#txtanchor"><span class="label label-default">TXT Records</span></a> <a href="#hostanchor"><span class="label label-default">Host (A) Records</span></a> <a href="#domainmap"><span class="label label-default">Domain Map</span></a></div><div class="clearfix" style="height: 30px;"></div>\n<div class="container">\n <div class="row">\n <div class="col-md-4">\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left; padding-left: 30px; padding-bottom: 20px;">Hosting (IP block owners)</P>\n<canvas id="hosting" height="380" width="300"></canvas></div>\n <div class="col-md-8">\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left; padding-left: 30px;">GeoIP of Host Locations</P>\n <div id="world-map" style="width: 480px; height: 380px"></div>\n</div> </div>\n</div>\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="dnsanchor"></a>DNS Servers</P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; border-color: #777;">\n \n <tr><td class="col-md-4">ns01.domaincontrol.com.<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=ns01.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers from IP address (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/zonetransfer/?q=ns01.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-log-in" data-toggle="tooltip" data-placement="top" title="Attempt Zone Transfer (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=97.74.100.1" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path to IP address using MTR (Active)"></span></a> <a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/findshareddns/?q=ns01.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-cloud-download" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this DNS server"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="97.74.100.0/23" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="97.74.100.1" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n</td><td class="col-md-3">97.74.100.1<br><span style="font-size: 0.9em; color: #eee;">ns01.domaincontrol.com</span></td><td class="col-md-3">GODADDY-DNS<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">ns02.domaincontrol.com.<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=ns02.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers from IP address (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/zonetransfer/?q=ns02.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-log-in" data-toggle="tooltip" data-placement="top" title="Attempt Zone Transfer (Active)"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=173.201.68.1" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path to IP address using MTR (Active)"></span></a> <a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/findshareddns/?q=ns02.domaincontrol.com." data-target="#myModal"><span class="glyphicon glyphicon-cloud-download" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this DNS server"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="173.201.68.0/23" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="173.201.68.1" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n</td><td class="col-md-3">173.201.68.1<br><span style="font-size: 0.9em; color: #eee;">ns02.domaincontrol.com</span></td><td class="col-md-3">GODADDY-DNS<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n </table>\n</div>\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="mxanchor"></a>MX Records <span style="font-size: 0.8em; color: #777;">** This is where email for the domain goes...</P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; font-family: \'Courier New\', Courier, monospace;">\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com.mail.protection.outlook.com.<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=104.47.55.138" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=104.47.55.138" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="104.40.0.0/13" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="104.47.55.138" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n</td><td class="col-md-3">104.47.55.138<br><span style="font-size: 0.9em; color: #eee;">mail-bn8nam120138.inbound.protection.outlook.com</span></td><td class="col-md-3">MICROSOFT-CORP-MSN-AS-BLOCK<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n </table>\n</div>\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="txtanchor"></a>TXT Records <span style="font-size: 0.8em; color: #777;">** Find more hosts in Sender Policy Framework (SPF) configurations</span></P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; font-family: \'Courier New\', Courier, monospace;">\n\n<tr><td>&quot;MS=ms26206678&quot;</td></tr>\n\n<tr><td>&quot;v=spf1 ip4:50.240.76.25 include:spf.protection.outlook.com -all&quot;</td></tr>\n\n<tr><td>&quot;google-site-verification=O_PoQFTGJ_hZ9LqfNT9OEc0KPFERKHQ_1t1m0YTx_1E&quot;</td></tr>\n\n<tr><td>&quot;google-site-verification=7XKUMxJSTHBSzdvT7gH47jLRjNAS76nrEfXmzhR_DO4&quot;</td></tr>\n\n</table>\n</div>\n\n\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="hostanchor"></a>Host Records (A) <span style="font-size: 0.8em; color: #777;">** this data may not be current as it uses a static database (updated monthly)</span> </P>\n<div class="table-responsive" style="text-align: left;">\n <table class="table" style="font-size: 1.1em; font-family: \'Courier New\', Courier, monospace;">\n\n \n <tr><td class="col-md-4">blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=185.199.108.153" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=185.199.108.153" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="185.199.108.0/24" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="185.199.108.153" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="HTTP Server found in Global Scan data (Passive)">GitHub.com</span>\n\n\n\n\n\n\n\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP TECH: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="Apps / Technologies found in Global Scan data (Passive)">varnish</span>\n\n\n\n</td><td class="col-md-3">185.199.108.153<br><span style="font-size: 0.9em; color: #eee;">cdn-185-199-108-153.github.com</span></td><td class="col-md-3">FASTLY<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=143.244.156.80" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=143.244.156.80" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="143.244.144.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="143.244.156.80" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n<br><span style="font-size: 0.8em; color: #bbb;">SSH: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="SSH Server found in Global Scan data (Passive)">SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3</span>\n\n\n\n\n\n\n\n</td><td class="col-md-3">143.244.156.80<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=64.227.8.231" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=64.227.8.231" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="64.227.0.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="64.227.8.231" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="HTTP Server found in Global Scan data (Passive)">Apache/2.4.29 (Ubuntu)</span>\n\n\n\n\n\n\n\n\n<br><span style="font-size: 0.8em; color: #bbb;">HTTP TECH: </span>\n <span style="font-size: 0.9em; color: #eee; color: #0C0;" data-toggle="tooltip" data-placement="top" title="Apps / Technologies found in Global Scan data (Passive)">Ubuntu<br>Apache,2.4.29</span>\n\n\n\n</td><td class="col-md-3">64.227.8.231<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=192.34.56.157" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=192.34.56.157" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.34.56.0/24" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.34.56.157" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">192.34.56.157<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=192.241.216.208" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=192.241.216.208" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.241.192.0/19" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="192.241.216.208" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">192.241.216.208<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=167.71.95.71" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=167.71.95.71" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="167.71.80.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="167.71.95.71" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">167.71.95.71<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n <tr><td class="col-md-4">asdf.blacklanternsecurity.com<br>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/reverseiplookup/?q=157.245.247.197" data-target="#myModal"><span class="glyphicon glyphicon-th" data-toggle="tooltip" data-placement="top" title="Find hosts sharing this IP address"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/httpheaders/?q=http://asdf.blacklanternsecurity.com" data-target="#myModal"><span class="glyphicon glyphicon-globe" data-toggle="tooltip" data-placement="top" title="Get HTTP Headers"></span></a>\n<a class="external nounderline" data-toggle="modal" href="https://api.hackertarget.com/mtr/?q=157.245.247.197" data-target="#myModal"><span class="glyphicon glyphicon-random" data-toggle="tooltip" data-placement="top" title="Trace path"></span></a>\n<form style="display: inline;" role="form" action="." method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="157.245.240.0/20" name="targetip"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Search Banners for Netblock (Passive)"><span class="glyphicon glyphicon-eye-open"></span></button></form>\n<form style="display: inline;" role="form" action="https://hackertarget.com/nmap-online-port-scanner/" target="_blank" method="post"><input type="hidden" name="csrfmiddlewaretoken" value="FNUVMI6wikKoeDeCNL9cFyiCnsxbycmxnwLAffFtp8wzEwJEc1lJHpmrmZFVDxiS"><input type="hidden" value="157.245.247.197" name="send_scan[]"><button class="submit-with-icon" type="submit" data-toggle="tooltip" data-placement="top" title="Nmap Port Scan (Active)"><span class="glyphicon glyphicon-screenshot" style="color: #0C0;"></span></button></form>\n<!-- -->\n\n\n\n\n\n\n\n\n\n\n</td><td class="col-md-3">157.245.247.197<br><span style="font-size: 0.9em; color: #eee;">asdf.blacklanternsecurity.com</span></td><td class="col-md-3">DIGITALOCEAN-ASN<br><span style="font-size: 0.9em; color: #eee;">United States</span></td></tr>\n \n </table>\n<br>\n\n\n\n<div style="margin: 30px;" align="center"><a href="/static/asdf.blacklanternsecurity.com-202305190301.xlsx"><button type="button" class="btn btn-default"><span class="glyphicon glyphicon-download" aria-hidden="true"></span> Download .xlsx of Hosts</button></a> <a href="/static/asdf.blacklanternsecurity.com-202305190301.html" target="_blank"><button type="button" class="btn btn-default"><span class="glyphicon glyphicon-download" aria-hidden="true"></span> View Graph (beta)</button></div>\n\n<br>\n<p style="color: #ddd; font-family: \'Courier New\', Courier, monospace; text-align: left;"><a name="domainmap"></a>Mapping the domain<span style="font-size: 0.8em; color: #777;"> ** click for full size image</span> </P>\n<p>\n<a href="/static/asdf.blacklanternsecurity.com.png"><img style="max-width: 100%;" class="img-responsive" src="/static/asdf.blacklanternsecurity.com.png"></a>\n</p>\n</div>\n\n</div></div>\n\n<p class="lead" style="margin-top: 40px; margin-bottom: 30px;">DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.</p>\n\n </div>\n\n <p style="color: #777; margin-top: 40px;">this is a <a href="https://hackertarget.com/" title="Online Vulnerability Scanners"><button type="button" class="btn btn-danger btn-xs">HackerTarget.com</button></a> project</p>\n\n\n <div style="margin-top: 160px;" class="container">\n <div class="row">\n <div class="col-lg-12 text-center">\n <h2 class="section-heading text-uppercase"></h2>\n <h3 class="section-subheading text-muted">Open Source Intelligence for Networks</h3>\n </div>\n </div>\n <div style="margin-top: 30px;" class="row text-center">\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-user-secret fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Attack</h4>\n <p class="text-muted">The ability to quickly identify the attack surface is essential. Whether you are penetration testing or chasing bug bounties.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-shield fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Defend</h4>\n <p class="text-muted">Network defenders benefit from passive reconnaissance in a number of ways. With analysis informing information security strategy.</p>\n </div>\n <div class="col-md-4">\n <span class="fa-stack fa-4x">\n <i class="fa fa-mortar-board fa-stack-1x" style="color: #00CC00;"></i>\n </span>\n <h4 class="service-heading">Learn</h4>\n <p class="text-muted">Understanding network based OSINT helps information technologists to better operate, assess and manage the network.</p>\n </div>\n </div>\n </div>\n\n\n\n\n <div class="container" style="background-color: #474747; margin-top: 180px; padding-bottom: 80px;"><div class="col-md-2"></div><div class="col-md-8">\n\n <span class="glyphicon glyphicon-trash" style="font-size: 4em; line-height: 5.5em;"></span>\n<p style="font-size: 1.7em; line-height: 1.9em; margin-bottom: 80px;">Map an organizations attack surface with a virtual <i>dumpster dive*</i> of the DNS records associated with the target organization.</p>\n<p style="font-size: 1.2em; color: #fff;">*DUMPSTER DIVING: The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information.</p>\n</div> </div>\n\n\n<div class="container" style="text-align: left; margin-top: 80px; margin-bottom: 80px;">\n\n<h2 style="font-size: 1.8em;">Frequently Asked Questions</h2>\n\n<h4 style="margin-top: 30px;">How can I take my security assessments to the next level?</h4>\n\n<p>The company behind DNSDumpster is <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> where we provide online hosted access to trusted open source security vulnerability scanners and network intelligence tools.</P><P>Save time and headaches by incorporating our attack surface discovery into your vulnerability assessment process.</p><P style="text-align: center; padding: 30px;"><a href="https://hackertarget.com/" title="HackerTarget.com | Online Security Testing and Open Source Intelligence"><img src="https://hackertarget.com/wp-content/uploads/2019/09/know-your-network-tools.png" alt="HackerTarget.com | Online Security Testing and Open Source Intelligence"></a></p>\n\n<h4>What data does DNSDumpster use?</h4>\n\n<p>No brute force subdomain enumeration is used as is common in dns recon tools that enumerate subdomains. We use open source intelligence resources to query for related domain data. It is then compiled into an actionable resource for both attackers and defenders of Internet facing systems.</P>\n<P>More than a simple <a href="https://hackertarget.com/dns-lookup/" title="Online DNS Lookup">DNS lookup</a> this tool will discover those hard to find sub-domains and web hosts. The search relies on data from our crawls of the Alexa Top 1 Million sites, Search Engines, Common Crawl, Certificate Transparency, Max Mind, Team Cymru, Shodan and <a href="https://scans.io/" style="text-decoration: underline;">scans.io</a>.</P>\n\n<h4>I have hit the host limit, do you have a PRO option?</h4>\n\n<P>Over at <a href="https://hackertarget.com/" title="Online Vulnerability Scanners">hackertarget.com</a> there\'s a tool we call <a href="https://hackertarget.com/domain-profiler/">domain profiler</a>. This compiles data similar to DNSDumpster; with additional data discovery. Queries available are based on the membership plan with the number of results (subdomains) being unlimited. With a STARTER membership you have access to the domain profiler tool for 12 months. Once the years membership expires you will revert to BASIC member status, however access to Domain Profiler and Basic Nmap scans continue. The BASIC access does not expire.</P>\n\n<h4>What are some other resources and tools for learning more?</h4>\n\n<P>There are some great open source recon frameworks that have been developed over the past couple of years. In addition tools such as <b>Metasploit</b> and <b>Nmap</b> include various modules for enumerating DNS. Check our <a href="https://dnsdumpster.com/footprinting-reconnaissance/">Getting Started with Footprinting</a> for more information.</P>\n\n</div>\n\n\n\n<!-- Modal -->\n<div class="modal fade" id="myModal" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">\n <div class="modal-dialog">\n<div class="modal-heading lds-facebook" style="margin-top: 200px;"><div></div><div></div><div></div></div>\n <div class="modal-content" style="background-color: #CCC; white-space: pre-wrap; padding: 20px; text-shadow: none; font-size: 1.2em; max-width: 1000px;">\n </div><!-- /.modal-content -->\n </div><!-- /.modal-dialog -->\n</div><!-- /.modal -->\n\n</div></div>\n</div></div>\n\n<footer>\n<div class="row" style="background-color: #1e1e1e; padding-top: 40px; padding-bottom: 20px;"><div class="container">\n<div class="col-md-6 col-sm-12 right-border" style="text-align: center;">\n<div class="footer-about" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">About</h2>\n<p style="margin-top: 20px;">At <a href="https://hackertarget.com/">hackertarget.com</a>, we have been scanning the Internet since 2007. Our vulnerability scanners now reach millions of IP addresses every year. We work to raise awareness of the value in open source security solutions.</p>\n</div>\n</div>\n<div class="col-md-6 col-sm-12">\n<div class="contact-info" style="text-align: left; padding-left: 40px;">\n<h2 class="footer-title" style="font-size: 1.8em;">Stay in Touch</h2>\n\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-envelope"></i> dnsdumpster@gmail.com</p>\n</div>\n<div class="single">\n <p><i style="font-size: 1.2em;" class="fa fa-twitter"></i> <a href="https://twitter.com/hackertarget/">@hackertarget</a></p>\n</div>\n<!-- Begin MailChimp Signup Form -->\n<link href="https://cdn-images.mailchimp.com/embedcode/horizontal-slim-10_7.css" rel="stylesheet" type="text/css">\n<style type="text/css">\n #mc_embed_signup{background:#1e1e1e; clear:left; font:14px Helvetica,Arial,sans-serif; width:100%;}\n /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.\n We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */\n </style>\n <div id="mc_embed_signup">\n <form action="https://dnsdumpster.us17.list-manage.com/subscribe/post?u=3cbc62d931a69e74b2c856f1a&amp;id=532c46ab39" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate>\n <div id="mc_embed_signup_scroll" style="text-align: left;">\n\n <input type="email" value="" name="EMAIL" class="email" id="mce-EMAIL" placeholder="email address" required>\n <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->\n <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_3cbc62d931a69e74b2c856f1a_532c46ab39" tabindex="-1" value=""></div><br>\n <div class="clear" style="margin-top: 5px;"><input type="submit" style="background-color: #00CC00;" value="Subscribe to our List" name="subscribe" id="mc-embedded-subscribe" class="button"> <span style="font-size: 0.8em;">Low volume Updates and News</a></div>\n </div>\n </form>\n </div>\n\n <!--End mc_embed_signup-->\n\n</div>\n</div>\n</div>\n<div class="clearfix"></div>\n<div class="copyright" style="background-color: #1e1e1e; margin-top: 20px;">\n<p>Copyright &copy; 2023 Hacker Target Pty Ltd</p>\n</div>\n</div>\n</div>\n</div>\n</footer>\n </div>\n </div>\n </div>\n </div>\n\n\n\n\n</div></div>\n\n <!-- Bootstrap core JavaScript\n ================================================== -->\n <!-- Placed at the end of the document so the pages load faster -->\n <script src="https://dnsdumpster.com/static/js/jquery-1.12.4.min.js"></script>\n <script src="/static/js/bootstrap.min.js"></script>\n\n\n<script src="/static/Chart.js"></script>\n <link rel="stylesheet" href="/static/jquery-jvectormap-2.0.1.css" type="text/css" media="screen"/>\n <script src="/static/jquery-jvectormap-2.0.1.min.js"></script>\n <script src="/static/jquery-jvectormap-world-mill-en.js"></script>\n\n <script type="text/javascript">\nvar barChartData = {\nlabels : [\n\n"GODADDY-DNS",\n\n"MICROSOFT-CORP-MSN-AS-BLOCK",\n\n"FASTLY",\n\n"DIGITALOCEAN-ASN",\n\n],\ndatasets : [\n{\nfillColor : "#ccc",\nstrokeColor : "#ccc",\ndata : [\n\n2,\n\n1,\n\n1,\n\n6,\n\n],\n}\n]\n}\n\nwindow.onload = function(){\nvar ctx = document.getElementById("hosting").getContext("2d");\nwindow.myBar = new Chart(ctx).Bar(barChartData, {\n});\n}\n</script>\n\n\n<script>\nvar gdpData = {\n\n"US" : 3,\n\n"United States" : 7,\n\n};\n $(function(){\n$(\'#world-map\').vectorMap({\n map: \'world_mill_en\',\n backgroundColor: \'#333333\',\n zoomButtons : false,\n series: {\n regions: [{\n values: gdpData,\n scale: [\'#00CC00\', \'#008400\'],\n normalizeFunction: \'polynomial\'\n }]\n },\n onRegionTipShow: function(e, el, code){\n if (typeof gdpData[code] !=="undefined"){\n el.html(el.html()+\' <br>Hosts Found : \'+gdpData[code]);\n } \n }\n});\n });\n </script>\n\n\n\n<script type="text/javascript">\n $(document).ready(function() {\n$(\'[data-toggle="tooltip"]\').tooltip({\'placement\': \'top\'});\n\n$("body").on(\'DOMSubtreeModified\', ".modal-content", function() {\n $(".modal-heading").hide();\n $(".modal-content").show();\n});\n\n $(\'body\').on(\'hidden.bs.modal\', \'.modal\', function () {\n $(this).removeData(\'bs.modal\');\n });\n\n }); //END $(document).ready()\n\n\n$(\'a.external\').on(\'click\', function(e) {\n e.preventDefault();\n $(".modal-heading").show();\n $(".modal-content").hide();\n\n\n var url = $(this).attr(\'href\');\n $(".modal-body").html(\'<iframe id="myiframe" style="background-color: #ccc;" width="100%" height="100%" frameborder="0" scrolling="yes" allowtransparency="true" src="\'+url+\'"></iframe>\');\n });\n\n \n\n\n $(\'#myModal\').on(\'show.bs.modal\', function () {\n $(this).find(\'.modal-dialog\').css({\n width:\'80%\', //choose your width\n height:\'80%\',\n \'padding\':\'5\'\n });\n $(this).find(\'.modal-content\').css({\n height:\'100%\',\n \'border-radius\':\'0\',\n \'padding\':\'15\'\n });\n $(this).find(\'.modal-body\').html(null);\n $(this).find(\'.modal-body\').css({\n width:\'auto\',\n height:\'100%\',\n \'padding\':\'5\'\n });\n })\n\n </script>\n\n<script>\n$(document).ready(function(){\n $("#showloading").hide();\n $("#formsubmit").click(function(){\n $("#hideform").hide();\n $("#showloading").show();\n });\n\n});\n</script>\n<!-- Google tag (gtag.js) -->\n<script async src="https://www.googletagmanager.com/gtag/js?id=G-FPGN9YXFNE"></script>\n<script>\n window.dataLayer = window.dataLayer || [];\n function gtag(){dataLayer.push(arguments);}\n gtag(\'js\', new Date());\n\n gtag(\'config\', \'G-FPGN9YXFNE\');\n</script>\n </body>\n</html>\n',
15
15
  )
16
16
 
17
17
  def check(self, module_test, events):
@@ -17,7 +17,7 @@ class TestHunterio(ModuleTestBase):
17
17
  "reset_date": "1917-05-23",
18
18
  "team_id": 1234,
19
19
  "calls": {
20
- "_deprecation_notice": "Sums the searches and the verifications, giving an unprecise look of the available requests",
20
+ "_deprecation_notice": "Sums the searches and the verifications, giving an imprecise look of the available requests",
21
21
  "used": 999,
22
22
  "available": 2000,
23
23
  },
@@ -11,7 +11,7 @@ class TestTelerik(ModuleTestBase):
11
11
  # Simulate Telerik.Web.UI.WebResource.axd?type=rau detection
12
12
  expect_args = {"method": "GET", "uri": "/Telerik.Web.UI.WebResource.axd", "query_string": "type=rau"}
13
13
  respond_args = {
14
- "response_data": '{ "message" : "RadAsyncUpload handler is registered succesfully, however, it may not be accessed directly." }'
14
+ "response_data": '{ "message" : "RadAsyncUpload handler is registered successfully, however, it may not be accessed directly." }'
15
15
  }
16
16
  module_test.set_expect_requests(expect_args=expect_args, respond_args=respond_args)
17
17