<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>TheHarvester on Producthunt daily</title>
        <link>https://producthunt.programnotes.cn/en/tags/theharvester/</link>
        <description>Recent content in TheHarvester on Producthunt daily</description>
        <generator>Hugo -- gohugo.io</generator>
        <language>en</language>
        <lastBuildDate>Tue, 02 Sep 2025 15:29:14 +0800</lastBuildDate><atom:link href="https://producthunt.programnotes.cn/en/tags/theharvester/index.xml" rel="self" type="application/rss+xml" /><item>
        <title>theHarvester</title>
        <link>https://producthunt.programnotes.cn/en/p/theharvester/</link>
        <pubDate>Tue, 02 Sep 2025 15:29:14 +0800</pubDate>
        
        <guid>https://producthunt.programnotes.cn/en/p/theharvester/</guid>
        <description>&lt;img src="https://images.unsplash.com/photo-1724204400838-ca4cd781cc40?ixid=M3w0NjAwMjJ8MHwxfHJhbmRvbXx8fHx8fHx8fDE3NTY3OTgwOTd8&amp;ixlib=rb-4.1.0" alt="Featured image of post theHarvester" /&gt;&lt;h1 id=&#34;laramiestheharvester&#34;&gt;&lt;a class=&#34;link&#34; href=&#34;https://github.com/laramies/theHarvester&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;laramies/theHarvester&lt;/a&gt;
&lt;/h1&gt;&lt;p&gt;&lt;img src=&#34;https://github.com/laramies/theHarvester/blob/master/theHarvester-logo.webp&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;theHarvester&#34;
	
	
&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://github.com/laramies/theHarvester/workflows/TheHarvester%20Python%20CI/badge.svg&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;TheHarvester CI&#34;
	
	
&gt; &lt;img src=&#34;https://github.com/laramies/theHarvester/workflows/TheHarvester%20Docker%20Image%20CI/badge.svg&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;TheHarvester Docker Image CI&#34;
	
	
&gt;
&lt;a class=&#34;link&#34; href=&#34;https://inventory.raw.pm/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://inventory.raw.pm/img/badges/Rawsec-inventoried-FF5050_flat_without_logo.svg&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Rawsec’s CyberSecurity Inventory&#34;
	
	
&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;about&#34;&gt;About
&lt;/h2&gt;&lt;p&gt;theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain&amp;rsquo;s external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
multiple public resources that include:&lt;/p&gt;
&lt;h2 id=&#34;install-and-dependencies&#34;&gt;Install and dependencies
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Python 3.12 or higher.&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://github.com/laramies/theHarvester/wiki/Installation&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://github.com/laramies/theHarvester/wiki/Installation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Install uv:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;curl -LsSf https://astral.sh/uv/install.sh &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; sh
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Clone the repository:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;2
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;git clone https://github.com/laramies/theHarvester
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;nb&#34;&gt;cd&lt;/span&gt; theHarvester
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Install dependencies and create a virtual environment:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;uv sync
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Run theHarvester:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;uv run theHarvester
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;h2 id=&#34;development&#34;&gt;Development
&lt;/h2&gt;&lt;p&gt;To install development dependencies:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;uv sync --extra dev
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;To run tests:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;uv run pytest
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;To run linting and formatting:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;uv run ruff check
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;uv run ruff format
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;h2 id=&#34;passive-modules&#34;&gt;Passive modules
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;baidu: Baidu search engine (&lt;a class=&#34;link&#34; href=&#34;https://www.baidu.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.baidu.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;bevigil: CloudSEK BeVigil scans mobile application for OSINT assets (&lt;a class=&#34;link&#34; href=&#34;https://bevigil.com/osint-api&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://bevigil.com/osint-api&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;brave: Brave search engine - now uses official Brave Search API (&lt;a class=&#34;link&#34; href=&#34;https://api-dashboard.search.brave.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://api-dashboard.search.brave.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;bufferoverun: Fast domain name lookups for TLS certificates in IPv4 space (&lt;a class=&#34;link&#34; href=&#34;https://tls.bufferover.run&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://tls.bufferover.run&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;builtwith: Find out what websites are built with (&lt;a class=&#34;link&#34; href=&#34;https://builtwith.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://builtwith.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;censys: Uses certificates searches to enumerate subdomains and gather emails (&lt;a class=&#34;link&#34; href=&#34;https://censys.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://censys.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;certspotter: Cert Spotter monitors Certificate Transparency logs (&lt;a class=&#34;link&#34; href=&#34;https://sslmate.com/certspotter&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://sslmate.com/certspotter&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;criminalip: Specialized Cyber Threat Intelligence (CTI) search engine (&lt;a class=&#34;link&#34; href=&#34;https://www.criminalip.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.criminalip.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;crtsh: Comodo Certificate search (&lt;a class=&#34;link&#34; href=&#34;https://crt.sh&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://crt.sh&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dehashed: Take your data security to the next level is (&lt;a class=&#34;link&#34; href=&#34;https://dehashed.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://dehashed.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dnsdumpster: Domain research tool that can discover hosts related to a domain (&lt;a class=&#34;link&#34; href=&#34;https://dnsdumpster.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://dnsdumpster.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;duckduckgo: DuckDuckGo search engine (&lt;a class=&#34;link&#34; href=&#34;https://duckduckgo.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://duckduckgo.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;fullhunt: Next-generation attack surface security platform (&lt;a class=&#34;link&#34; href=&#34;https://fullhunt.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://fullhunt.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;github-code: GitHub code search engine (&lt;a class=&#34;link&#34; href=&#34;https://www.github.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.github.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;hackertarget: Online vulnerability scanners and network intelligence to help organizations (&lt;a class=&#34;link&#34; href=&#34;https://hackertarget.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://hackertarget.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;haveibeenpwned: Check if your email address is in a data breach (&lt;a class=&#34;link&#34; href=&#34;https://haveibeenpwned.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://haveibeenpwned.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;hunter: Hunter search engine (&lt;a class=&#34;link&#34; href=&#34;https://hunter.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://hunter.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;hunterhow: Internet search engines for security researchers (&lt;a class=&#34;link&#34; href=&#34;https://hunter.how&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://hunter.how&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;intelx: Intelx search engine (&lt;a class=&#34;link&#34; href=&#34;https://intelx.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://intelx.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;leaklookup: Data breach search engine (&lt;a class=&#34;link&#34; href=&#34;https://leak-lookup.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://leak-lookup.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;netlas: A Shodan or Censys competitor (&lt;a class=&#34;link&#34; href=&#34;https://app.netlas.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://app.netlas.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;onyphe: Cyber defense search engine (&lt;a class=&#34;link&#34; href=&#34;https://www.onyphe.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.onyphe.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;otx: AlienVault open threat exchange (&lt;a class=&#34;link&#34; href=&#34;https://otx.alienvault.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://otx.alienvault.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;pentesttools: Cloud-based toolkit for offensive security testing, focused on web applications and network penetration testing (&lt;a class=&#34;link&#34; href=&#34;https://pentest-tools.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://pentest-tools.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;projecdiscovery: Actively collects and maintains internet-wide assets data, to enhance research and analyse changes around DNS for better insights (&lt;a class=&#34;link&#34; href=&#34;https://chaos.projectdiscovery.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://chaos.projectdiscovery.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;rapiddns: DNS query tool which make querying subdomains or sites of a same IP easy (&lt;a class=&#34;link&#34; href=&#34;https://rapiddns.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://rapiddns.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;rocketreach: Access real-time verified personal/professional emails, phone numbers, and social media links (&lt;a class=&#34;link&#34; href=&#34;https://rocketreach.co&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://rocketreach.co&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;securityscorecard: helps TPRM and SOC teams detect, prioritize, and remediate vendor risk across their entire supplier ecosystem at scale (&lt;a class=&#34;link&#34; href=&#34;https://securityscorecard.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://securityscorecard.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;securityTrails: Security Trails search engine, the world&amp;rsquo;s largest repository of historical DNS data (&lt;a class=&#34;link&#34; href=&#34;https://securitytrails.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://securitytrails.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;-s, &amp;ndash;shodan: Shodan search engine will search for ports and banners from discovered hosts (&lt;a class=&#34;link&#34; href=&#34;https://shodan.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://shodan.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;subdomaincenter: A subdomain finder tool used to find subdomains of a given domain (&lt;a class=&#34;link&#34; href=&#34;https://www.subdomain.center&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.subdomain.center&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;subdomainfinderc99: A subdomain finder is a tool used to find the subdomains of a given domain (&lt;a class=&#34;link&#34; href=&#34;https://subdomainfinder.c99.nl&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://subdomainfinder.c99.nl&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;threatminer: Data mining for threat intelligence (&lt;a class=&#34;link&#34; href=&#34;https://www.threatminer.org&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.threatminer.org&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;tomba: Tomba search engine (&lt;a class=&#34;link&#34; href=&#34;https://tomba.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://tomba.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;urlscan: A sandbox for the web that is a URL and website scanner (&lt;a class=&#34;link&#34; href=&#34;https://urlscan.io&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://urlscan.io&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;venacus: Venacus search engine (&lt;a class=&#34;link&#34; href=&#34;https://venacus.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://venacus.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;virustotal: Domain search (&lt;a class=&#34;link&#34; href=&#34;https://www.virustotal.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.virustotal.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;whoisxml: Subdomain search (&lt;a class=&#34;link&#34; href=&#34;https://subdomains.whoisxmlapi.com/api/pricing&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://subdomains.whoisxmlapi.com/api/pricing&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;yahoo: Yahoo search engine (&lt;a class=&#34;link&#34; href=&#34;https://www.yahoo.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.yahoo.com&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;zoomeye: China&amp;rsquo;s version of Shodan (&lt;a class=&#34;link&#34; href=&#34;https://www.zoomeye.org&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.zoomeye.org&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;active-modules&#34;&gt;Active modules
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;DNS brute force: dictionary brute force enumeration&lt;/li&gt;
&lt;li&gt;Screenshots: Take screenshots of subdomains that were found&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;modules-that-require-an-api-key&#34;&gt;Modules that require an API key
&lt;/h2&gt;&lt;p&gt;Documentation to setup API keys can be found at - &lt;a class=&#34;link&#34; href=&#34;https://github.com/laramies/theHarvester/wiki/Installation#api-keys&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://github.com/laramies/theHarvester/wiki/Installation#api-keys&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;bevigil - 50 free queries/month, 1k queries/month $50&lt;/li&gt;
&lt;li&gt;brave - Free plan available, Pro plans for higher limits&lt;/li&gt;
&lt;li&gt;bufferoverun - 100 free queries/month, 10k/month $25&lt;/li&gt;
&lt;li&gt;builtwith - 50 free queries ever, $2950/yr&lt;/li&gt;
&lt;li&gt;censys - 500 credits $100&lt;/li&gt;
&lt;li&gt;criminalip - 100 free queries/month, 700k/month $59&lt;/li&gt;
&lt;li&gt;dehashed - 500 credts $15, 5k credits $150&lt;/li&gt;
&lt;li&gt;dnsdumpster - 50 free querries/day, $49&lt;/li&gt;
&lt;li&gt;fullhunt - 50 free queries, 200 queries $29/month, 500 queries $59/month&lt;/li&gt;
&lt;li&gt;github-code&lt;/li&gt;
&lt;li&gt;haveibeenpwned - 10 email searches/min $4.50, 50 email searches/min $22&lt;/li&gt;
&lt;li&gt;hunter - 50 credits/month free, 12k credits/yr $34&lt;/li&gt;
&lt;li&gt;hunterhow - 10k free API results per 30 days, 50k API results per 30 days $10&lt;/li&gt;
&lt;li&gt;intelx&lt;/li&gt;
&lt;li&gt;leaklookup - 20 credits $10, 50 credits $20, 140 credits $50, 300 credits $100&lt;/li&gt;
&lt;li&gt;netlas - 50 free requests/day, 1k requests $49, 10k requests $249&lt;/li&gt;
&lt;li&gt;onyphe - 10M results/month $587&lt;/li&gt;
&lt;li&gt;pentesttools - 5 assets netsec $95/month, 5 assets webnetsec $140/month&lt;/li&gt;
&lt;li&gt;projecdiscovery - requires work email. Free monthly discovery and vulnerability scans on sign-up email domain, enterprise $&lt;/li&gt;
&lt;li&gt;rocketreach - 100 email lookups/month $48, 250 email lookups/month $108&lt;/li&gt;
&lt;li&gt;securityscorecard&lt;/li&gt;
&lt;li&gt;securityTrails - 50 free queries/month, 20k queries/month $500&lt;/li&gt;
&lt;li&gt;shodan - Freelancer $69 month, Small Business $359 month&lt;/li&gt;
&lt;li&gt;tomba - 25 searches/month free, 1k searches/month $39, 5k searches/month $89&lt;/li&gt;
&lt;li&gt;venacus - 1 search/day free, 10 searches/day $12, 30 searches/day $36&lt;/li&gt;
&lt;li&gt;whoisxml - 2k queries $50, 5k queries $105&lt;/li&gt;
&lt;li&gt;zoomeye - 5 results/day free, 30/results/day $190/yr&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;comments-bugs-and-requests&#34;&gt;Comments, bugs, and requests
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://twitter.com/laramies&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://img.shields.io/twitter/follow/laramies.svg?style=social&amp;amp;label=Follow&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Twitter Follow&#34;
	
	
&gt;&lt;/a&gt; Christian Martorella @laramies
&lt;a class=&#34;link&#34; href=&#34;mailto:cmartorella@edge-security.com&#34; &gt;cmartorella@edge-security.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://twitter.com/NotoriousRebel1&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://img.shields.io/twitter/follow/NotoriousRebel1.svg?style=social&amp;amp;label=Follow&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Twitter Follow&#34;
	
	
&gt;&lt;/a&gt; Matthew Brown @NotoriousRebel1&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://twitter.com/jay_townsend1&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://img.shields.io/twitter/follow/jay_townsend1.svg?style=social&amp;amp;label=Follow&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Twitter Follow&#34;
	
	
&gt;&lt;/a&gt; Jay &amp;ldquo;L1ghtn1ng&amp;rdquo; Townsend @jay_townsend1&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;main-contributors&#34;&gt;Main contributors
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://twitter.com/NotoriousRebel1&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://img.shields.io/twitter/follow/NotoriousRebel1.svg?style=social&amp;amp;label=Follow&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Twitter Follow&#34;
	
	
&gt;&lt;/a&gt; Matthew Brown @NotoriousRebel1&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://twitter.com/jay_townsend1&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://img.shields.io/twitter/follow/jay_townsend1.svg?style=social&amp;amp;label=Follow&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Twitter Follow&#34;
	
	
&gt;&lt;/a&gt; Jay &amp;ldquo;L1ghtn1ng&amp;rdquo; Townsend @jay_townsend1&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://twitter.com/discoverscripts&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;&lt;img src=&#34;https://img.shields.io/twitter/follow/discoverscripts.svg?style=social&amp;amp;label=Follow&#34;
	
	
	
	loading=&#34;lazy&#34;
	
		alt=&#34;Twitter Follow&#34;
	
	
&gt;&lt;/a&gt; Lee Baird @discoverscripts&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;thanks&#34;&gt;Thanks
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;John Matherly - Shodan project&lt;/li&gt;
&lt;li&gt;Ahmed Aboul Ela - subdomain names dictionaries (big and small)&lt;/li&gt;
&lt;/ul&gt;
</description>
        </item>
        
    </channel>
</rss>
