• Stars
    star
    252
  • Rank 161,312 (Top 4 %)
  • Language
    Shell
  • License
    MIT License
  • Created almost 7 years ago
  • Updated almost 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

An OSINT tool to find contacts in order to report security vulnerabilities.

contact.sh

An OSINT tool to find contacts in order to report security vulnerabilities.

image

Buy Me A Coffee

Installation

🐧 GNU/Linux

Make sure you have installed the whois and jq packages.

$ git clone https://github.com/EdOverflow/contact.sh.git
$ cd contact.sh/
$ chmod u+x contact.sh
$ ./contact.sh -d google.com -c google

🍎 OSX

$ brew install gnu-sed --with-default-names
$ brew install jq
$ git clone https://github.com/EdOverflow/contact.sh.git
$ cd contact.sh/
$ chmod u+x contact.sh
$ ./contact.sh -d google.com -c google

Usage

$ ./contact.sh


 _  _ __ _|_ _  _ _|_    _ |_ 
(_ (_)| | |_(_|(_  |_ o _> | |
            ---
        by EdOverflow


[i] Description: An OSINT tool to find contacts in order to report security vulnerabilities.
[i] Usage: ./contact.sh [Options] use -d for hostnames (-d example.com), -c for vendor name (-c example), and -f for a list of hostnames in a file (-f domains.txt) 
[i] Example: ./contact.sh -d google.com -c google

Use the -d flag when trying to find addresses linked to a domain. contact.sh will return a "Confidence level" based on the source of the information retrieved. A security.txt file located on the domain will have a higher priority than a Twitter account on the company's website.

$ ./contact.sh -d google.com

The -c flag allows you to specify the company's name.

$ ./contact.sh -c google

If the company's name contains spaces, make sure to place the name inside quotes.

$ ./contact.sh -c "keeper security"

You can check a list of domains using the -f flag.

$ ./contact.sh -f domains.txt

For the best results, combine both flags as follows:

$ ./contact.sh -d google.com -c google

contact.sh abides by the target's robots.txt file.

$ ./contact.sh -d linkedin.com


 _  _ __ _|_ _  _ _|_    _ |_ 
(_ (_)| | |_(_|(_  |_ o _> | |
            ---
        by EdOverflow


[+] Finding security.txt files 
 | Confidence level: ★ ★ ★ 
[!] The robots.txt file does not permit crawling this hostname.

[+] Checking HackerOne's directory for hostname 
 | Confidence level: ★ ★ ★ 
https://hackerone.com/linkedin

Contributing

I welcome contributions from the public.

Using the issue tracker 💡

The issue tracker is the preferred channel for bug reports and features requests.

Issues and labels 🏷

The bug tracker utilizes several labels to help organize and identify issues.

Guidelines for bug reports 🐛

Use the GitHub issue search — check if the issue has already been reported.

More Repositories

1

bugbounty-cheatsheet

A list of interesting payloads, tips and tricks for bug bounty hunters.
5,775
star
2

can-i-take-over-xyz

"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Python
4,823
star
3

bugbountyguide

Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
HTML
453
star
4

megplus

Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Shell
298
star
5

bugbountywiki

The Bug Bounty Wiki
167
star
6

proof-of-concepts

A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
HTML
162
star
7

bug-bounty-responses

A collection of response templates for invalid bug bounty reports.
80
star
8

hacks

Some random scripts. Just trying to be like the cool kids.
Shell
79
star
9

legal-bug-bounty

#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
64
star
10

smith

Simple wrapper for meg that sieves through meg's output for you.
Shell
60
star
11

security-template

A static website template for security pages.
HTML
49
star
12

curate

A tool for fetching archived URLs (to be rewritten in Go).
Shell
39
star
13

h1-cli

A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.
Shell
33
star
14

security-policy-specification-standard

This document proposes a way of standardising the structure, language, and grammar used in security policies.
25
star
15

hunter

Guidelines for writing secure code for Python developers.
18
star
16

cryptojourney-content

Learn the basics of cryptography throughout history.
18
star
17

bounty-formula

A formula to calculate bounty amounts.
HTML
12
star
18

propaganda

Generate a personal Jekyll website using your Bibtex references.
CSS
10
star
19

hackerone-security-policy

This is the security policy for https://hackerone.com/ed.
5
star
20

bounty-pls

A Chrome extension that spices up those #togetherwehitharder tweets.
JavaScript
5
star
21

edoverflow

2
star
22

slides

Slides from my past talks.
2
star
23

.gitignore

🤔
1
star