Make sure you have pip and python3 installed:
sudo apt-get install python3 -y
sudo apt-get install python3-pip
Clone the repo and do these steps:
git clone https://github.com/SecYuri/E3numer.git
chmod +x setup.sh
sudo ./setup.sh
python3 E3numer.py
The tool is developed to automate the Recon and auditing process, It's been designed to be plug-in and play style, you need only need to specify the domain and it will
- take your domain and enumerate subdomains then filter for the live subdomains the tool
- pipe the live subdomains to check what technologies they run and their versions by integrating with wappalyzer
- It will also detect WAF presence and its type
- it will run gobuster against each alive subdomain found.
- it will Nmap scan again all live subdomains
- it will nuclei against every alive subdomain found
The tool is using security trails and wappalyzer non-commercial api-keys, we strongly recommend you register an account on both and use your own api-keys to avoid quota errors.
- you will find directories created named after each alive subdomain found, under each directory, you will find
nmap.txt
,gobuster.txt
,waf result
,..etc. you will also file theresult.html
file that contains every information found that belongs to that subdomain, and this applies to each directory (for each subdomain found), The tool will generate a nuclei output file. - You might see some errors popping off to the terminal while the tool is running as the tool might try to Nmap a directory that doesn't respond or try to run gobuster against a randomly configured subdomain as the tool try to squeeze for every single piece of info, however, the tool will continue running until it finishes.