Skip to content

iamthefrogy/frogy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Made with ❤️ ❤️ ❤️ from frogy

My goal is to create an open-source Attack Surface Management solution and make it capable to find all the IPs, domains, subdomains, live websites, login portals for one company.

How it can help a large company (Some usecases):

  • Vulnerability management team: Can use the result to feed into their known and unknown assets database to increase their vulnerability scanning coverage.
  • Threat intel team: Can use the result to feed into their intel DB to prioritize proactive monitoring for critical assets.
  • Asset inventory team: Can use the result to keep their asset inventory database up-to-date by adding new unknown assets facing Internet and finding contact information for the assets inside your organization.
  • SOC team: Can use the result to identify what all assets they are monitoring vs. not monitoring and then increase their coverage slowly.
  • Patch management team: Many large organizations are unaware of their legacy, abandoned assets facing the Internet; they can utilize this result to identify what assets need to be taken offline if they are not being used.

It has multiple use cases depending your organization's processes and technology landscpae.

Logic
Frogy

Features

  • 🐸 Horizontal subdomain enumeration
  • 🐸 Vertical subdomain enumeration
  • 🐸 Resolving subdomains to IP
  • 🐸 Identifying live web applications
  • 🐸 Identifying all the contextual properties of the web application such as title, content lenght, server, IP, cname, etc. (through httpx tool)
  • Requirements: Go Language, Python 3.+, jq

  • Installation

    Login as root and run the below command.
    bash install.sh
  • Usage

    ./frogy.sh
  • Demo Scenario 1 Use frogy.sh when you want to start discovery for any new target and you just have their one primary domain.

    Frogy

  • Output

    Output file will be saved inside the output/company_name/webometry.csv folder. Where company_name is any company name which you give as an input to 'Organization Name' at the start of the script.
    

A very warm thanks to the authors of the tools used in this script.

Warning/Disclaimer: Read the detailed disclaimer at my blog - https://github.com/iamthefrogy/Disclaimer-Warning/blob/main/README.md
Logo credit - www.designevo.com

About

My subdomain enumeration script. It's unique in the way it is built upon.

Topics

Resources

Stars

Watchers

Forks

Contributors 4

  •  
  •  
  •  
  •