Advertisement
fplanzer

domain typosquatting hijacking check

Mar 24th, 2022
1,019
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.36 KB | None | 0 0
  1. git clone https://github.com/atenreiro/opensquat
  2. pip install -r requirements.txt
  3.  
  4. Edit the "keywords.txt" with your customised keywords to hunt.
  5.  
  6.  
  7.   # Lazy run with default options
  8.     python opensquat.py
  9.  
  10.     # for all the options
  11.     python opensquat.py -h
  12.    
  13.     # Search for generic terms used in phishing campaigns (can lead to false positives)
  14.     python opensquat.py -k generic.txt
  15.  
  16.     # With DNS validation (quad9)
  17.     python opensquat.py --dns
  18.    
  19.     # Subdomain search
  20.     python opensquat.py --subdomains
  21.    
  22.     # Check for domains with open ports 80/443
  23.     python opensquat.py --portcheck
  24.  
  25.     # With Phishing validation (Phishing Database)
  26.     python opensquat.py --phishing phish_results.txt
  27.  
  28.     # Save output as JSON
  29.     python opensquat.py -o example.json -t json
  30.  
  31.     # Save output as CSV
  32.     python opensquat.py -o example.csv -t csv
  33.  
  34.     # Conduct a certificate transparency (ct) hunt
  35.     python opensquat.py --ct
  36.  
  37.     # Period search - registrations from the last month (default: day)
  38.     python opensquat.py -p month
  39.  
  40.     # Tweak confidence level. The lower values bring more false positives
  41.     # (0: very high, 1: high (default), 2: medium, 3: low, 4: very low
  42.     python opensquat.py -c 2
  43.  
  44.     # All validations options
  45.     python opensquat.py --phishing phishing_domains.txt --dns --ct --subdomains --portcheck
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement