Nytro Posted July 21, 2013 Report Posted July 21, 2013 SpiderFoot v2.0 Released SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on. The main objective of SpiderFoot is to automate the footprinting process to the greatest extent possible, freeing up a penetration tester’s time to focus their efforts on the security testing itself. Main featuresFast, Easy to UseHighly ConfigurableFor Windows & LinuxCreate your own modules in PythonNew in this release, which is actually a complete re-write of the version from 2005(!):Now runs on Windows as well as Linux, Solaris, *BSD (basically anything with Python should be fine)Scans are even more configurable than beforeAll scan data stored locally in an SQLite database for querying, reporting and analysisMany more scans/tests included (GeoIP, URL linkage, web technology, port scans…)You can now easily extend functionality by writing your own modules in PythonCompletely new user interface, which is now entirely web-basedConfiguration state is stored between runsScanning can be remotely controlled Full Changelog: https://github.com/smicallef/spiderfoot/wiki/Release-Notes More Information: SpiderFoot - The Open Source Footprinting tool Download: http://sourceforge.net/projects/spiderfoot/files/ Sursa: SpiderFoot v2.0 Released | ToolsWatch.org - The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Quote
Versus71 Posted January 10, 2014 Report Posted January 10, 2014 update v.2.1.0Major improvements are as follows:Identifies sites co-hosted on IPs of your target.Checks whether your target, affiliates or co-hosts have a bad reputation (PhishTank, Google SafeBrowsing, McAfee SiteAdvisor, abuse.ch and many more.)Identifies the ISPs and BGP AS of your target.Smarter at identifying owned netblocks.UI enhancements, including some data visualizations.More comprehensive searches across other Internet TLDs.Identifies the use of non-standard HTTP headers.Bing searches.Many tweaks, improvements and bug fixes.Link:https://github.com/smicallef/spiderfoot/archive/2.1.zip Quote