██████╗ ██╗███████╗
██╔══██╗██║██╔════╝
██████╔╝██║█████╗
██╔══██╗██║██╔══╝
██████╔╝██║███████╗
╚═════╝ ╚═╝╚══════╝
Bie automates initial enumeration and scanning commonly performed on Hack The Box (HTB) and TryHackMe machines. It integrates many tools such as Nmap, Nikto, ffuf, enum4linux.. to be as comprehensive as possible.
- Nmap Scans: Conducts full port and classic Nmap scans with the needed options.
- Subdomain Enumeration: Utilizes wfuzz to discover subdomains of the specified domain.
- Directory Fuzzing: Fast ffuf directory fuzzing.
- Web Server Scan: Conducts a web server scan using Nikto.
- SMB enumeration: Using enum4linux if ports 139 or 445 are available.
- Additional Enumeration: You can use your own tools here.
- Nmap
- Nikto
- wfuzz
- ffuf
- enum4linux
sudo python3 bie.py <IP> [-d <domain>]
<ip>
: Mandatory argument specifying the IP address of the target.[-d/--domain <domain>]
: Optional argument providing the domain name of the target (for subdomain enumeration).
Example:
sudo python3 bie.py 10.10.11.242 -d somedomain
How to filter valid subdomains? (change 154 with the repeating number of Chars)
cat subdomain_enum.txt | grep -v "154 Ch"
You may need to change wordlists location (inside bie.py) to where you have them, this is the default configuration:
- This script needs to be ran using sudo for the /etc/hosts changes to take place.
- Ensure that you have appropriate permissions before scanning any target.
- Usage of this script for unauthorized access or against targets without proper authorization is strictly prohibited.
This script is provided for educational and informational purposes only. Usage of this script for any unauthorized activities is not endorsed or encouraged. The author shall not be responsible for any misuse or damage caused by the script.