A small bug bounty reconnaissance automation tool.
- Take Screenshots from subdomains via @sensepost/gowitness
- Get title and headers from subdomains via @sensepost/gowitness
- General info about company and CIDRs
- Network scan via @nmap/nmap
- HTTP scan via @nmap/nmap
- Collecting and separating archive urls via @tomnomnom/unfurl, @tomnomnom/gf, @lc/gau, @tomnomnom/waybackurls
- Templated-based vulnerability scan with @projectdiscovery/nuclei
- Directory fuzzing with @maurosoria/dirsearch
- SSL scan with @rbsec/sslscan
- Get all host IPs from subdomains
- Clone the repository with the following command :
git clone https://github.com/Huntinex/rauton
- Run the installation file :
./install.sh
- Edit the script configuration section and enter your
dirsearch_wordlist_path
.
For a single domain use :
./rauton.sh -single apple.com
# or (default mode is single)
./rauton.sh apple.com
And for wildcard domains use :
./rauton.sh -wild apple.com