Reconnaissance is the first phase of penetration testing, which means gathering information before planning any actual attack . Therefore, Ashok is an incredibly fast reconnaissance tool designed specifically for the reconnaissance phase. In Ashok-v1.1, you can find advanced google dorker and wayback crawlers .
- Wayback Crawler Machine<br>- Google Dorking without limits<br>- Github Information Grabbing<br>- Subdomain Identifier <br>- Cms/Technology Detector With Custom Headers<br>
~> git clone <a href=" https://github.com/ankitdobhal/Ashok " rel="nofollow"><span>https</span><span>://</span><span>github</span><span>.</span><span>com</span><span >/</span><span>ankitdobhal</span><span>/</span><span>Ashok</span></a><br>~> cd Ashok<br>~> python3.7 -m pip3 install -r requirements.txt<br>
The usage section of the wiki provides detailed usage instructions,
but here is an index of some of the options:
- Extract HTTP headers from a single URL
- Dumps the Internet Archive Machine's JSON output for a single URL
- Google dorking uses the result number as dorknumber
- DNS lookup for a single target domain
- Subdomain lookup for a single target domain
- Use nmap to port scan a single target domain
- Extract data using the target's Github username
- Detect the Cms of the target URL
$ docker pull powerexploit/ashok-v1.2<br>$ docker container run -it powerexploit/ashok-v1.2 --help<br>
Download Ashok