NOTE: VERSION 2.0 RELEASED DOWNLOAD IT FROM *RELEASE* section. WEB-Scanner added and dnsenum removed to save time
OneType is a comprehensive WEB site reconnaissance automation script designed for security professionals and enthusiasts. It automates the process of gathering information about a specified domain through various command-line utilities. By leveraging tools like nslookup
, whois
, nmap
, and more, OneType provides a streamlined approach to perform reconnaissance, vulnerability scanning, and subdomain enumeration, all while saving the results in an organized manner.
- DNS Information Gathering: Utilizes
nslookup
,host
,dig
, anddnsrecon
to collect detailed DNS records and information about the target domain. - Whois Lookup: Retrieves registration details of the domain, including owner information and registration dates.
- Subdomain Enumeration: Identifies subdomains associated with the target domain using
assetfinder
. - Vulnerability Scanning: Performs security assessments using tools like
wapiti
, andwig
to identify potential vulnerabilities in web applications. - Network Scanning: Uses
nmap
to discover services, operating systems, and open ports on the target domain. - Output Management: Saves all results in a dedicated "output" directory for easy access and analysis.
- Run the script:
bash
git clone https://github.com/CYBER-MRINAL/onetype.git
cd ONE-Type
python3 onetype.py
- Choose your disro Debain, Arch, Red Hat:
git clone https://github.com/CYBER-MRINAL/onetype.git cd ONE-Type python3 setup.py (this will show you that type of cotent) ENTER THE NUMBER OF YOUR DISTRO BASED ON : 1 = DEBIAN 2 = ARCH 3 = RED HAT ENTER HERE =
- Ensure all required tools are installed on your system. Before you go run main script you need to run
setup.py
file at first for one time. (after one time not required)
- Clone the repository:
git clone https://github.com/CYBER-MRINAL/ONE-Type.git cd ONE-Type python3 onetype.py
-
Run the script:
python3 onetype.py
-
When prompted, enter the domain name you wish to investigate:
【ENTER THE DOMAIN NAME】: example.com
-
Follow the prompts to enter the URL for vulnerability scanning:
【ENTER THE URL OF DOMAIN】: https/http://example.com
-
The tool will execute various scans and save the results in the "output" directory. You will see messages indicating the progress and completion of each scan.
All results will be saved in the "output" directory with the following files:
nslookup-rezult.txt
: Results from thenslookup
command.host-rezult.txt
: Results from thehost
command.whois-rezult.txt
: Results from thewhois
lookup.dig-rezult.txt
: Results from thedig
command.wig-rezult.txt
: Results from thewig
scan.nmap-rezult.txt
: Results from thenmap
scan.subdomains-rezult.txt
: Results from the subdomain enumeration.dnsrecon-rezult.txt
: Results from thednsrecon
scan.dnsenum-rezult.txt
: Results from thednsenum
scan.
Important: Always ensure you have explicit permission to perform scans and gather information about a domain. Unauthorized scanning can be illegal and unethical. Use this tool responsibly and in compliance with applicable laws and regulations.
Contributions are welcome! If you have suggestions for improvements or additional features, feel free to open an issue or submit a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.
Feel free to customize the repository URL, license, and any other details to fit your specific project needs! Contact me TELEGRAM