Skip to content

Python-based script for performing reverse ip / domain on your penetration testing target.

License

Notifications You must be signed in to change notification settings

relarizky/ReverseIP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ReverseIP

https://img.shields.io/github/license/relarizky/reverse-ip https://img.shields.io/badge/python-3.8.10-blue

Python-based script for performing Reverse IP on your penetration testing target.
This tool uses external APIs to do so, and you can add more APIs that you know to richify your result.
This tool is also built with good design that's very recognizable and understandable so you can add more APIs with ease.

Installation

$ git clone https://github.com/relarizky/reverse-ip
$ cd reverse-ip/
$ pip install requests pytest
$ python main.py

Usage

 _____                              _____ _____
|  __ \                            |_   _|  __ \
| |__) |_____   _____ _ __ ___  ___  | | | |__) |
|  _  // _ \ \ / / _ \ '__/ __|/ _ \ | | |  ___/
| | \ \  __/\ V /  __/ |  \__ \  __/_| |_| |
|_|  \_\___| \_/ \___|_|  |___/\___|_____|_|
--------------------------------------------
[+] Usage: python3 main.py target.com yes

all the found results will be automatically stored in saved/<yourtarget.com>/ directory .

Preview

Notes

.config.json is configuration file that is used for storing information like API key or default result saving directory.
if you create new API and ReverseIP class, store your API information in .config.json
then call the stored information inside reverse() method in your ReverseIP class.
Looking at HackerTarget class will give you a guide.

To do

  • Add more APIs
  • Make it colorful

Contribution

any contribution will be really appreciated.

License

This software is licensed under MIT License.

Releases

No releases published

Packages

 
 
 

Languages