Skip to content

PassiveDNS as a part of passive reconnaissance techniques using PowerShell script.

License

Notifications You must be signed in to change notification settings

FAlhumaid/PassiveDNS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

🕵️‍♂️ PassiveDNS

  • Passive reconnaissance is an important part of any security assessment, as it allows you to gather information about a target without alerting them to your presence. One way to perform passive reconnaissance is by using PowerShell and leveraging passive DNS data.

  • This PowerShell script makes use of the mnemonic Passive DNS service to gather historical DNS data for a given domains or IP Addresses. The script sends bulk requests to the API and exports the findings to a CSV file for further analysis.

🎬 Demo

  • To view the demo, please click the image below:

Alt text

🔗 Links

  • Your feedback is valuable to me and I would greatly appreciate it if you could share your thoughts with me.
  • If you have any comments, suggestions, or concerns, please don't hesitate to get in touch with me through Twitter or LinkedIn.

Twitter: (FS_Alhumaid)

twitter

LinkedIn: (FAlhumaid)

linkedin

About

PassiveDNS as a part of passive reconnaissance techniques using PowerShell script.

Topics

Resources

License

Stars

Watchers

Forks