From b4ee4c5bae805b57f009683a258d7e7fa804c211 Mon Sep 17 00:00:00 2001 From: Wolfblue28 <148431543+Wolfblue28@users.noreply.github.com> Date: Thu, 26 Oct 2023 20:03:21 +0100 Subject: [PATCH] Create @cryptoscraper.ng Spiderfoot./cli.py --- @cryptoscraper.ng | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 @cryptoscraper.ng diff --git a/@cryptoscraper.ng b/@cryptoscraper.ng new file mode 100644 index 0000000000..8f99265ae7 --- /dev/null +++ b/@cryptoscraper.ng @@ -0,0 +1,35 @@ +Steve@rouge:~/Downloads/spiderfoot$ # +steve@rogue:~/Downloads/spiderfoot$ # will see the malicious link as residing on +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ # You can read more about it here: https://0 +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ # Checking for this with SpiderFoot is prett +steve@rogue:~/Downloads/spiderfoot$ # modules working together. A big thanks to +steve@rogue:~/Downloads/spiderfoot$ # contribution! +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ # We need to enable sfp_dnsresolve and sfp_d +steve@rogue:~/Downloads/spiderfoot$ # DNS records (the CNAMEs) during the scan, +steve@rogue:~/Downloads/spiderfoot$ # sfp_dnsbrute and even sfp_spider to find a +steve@rogue:~/Downloads/spiderfoot$ # that might point to a cloud service. Final +steve@rogue:~/Downloads/spiderfoot$ # enable sfp_subdomain_takeover to perform t +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ steve@rogue:~/Downloads/spiderfoot$ # will see the malicious link as residing on +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ # You can read more about it here: https://0 +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ # Checking for this with SpiderFoot is prett +steve@rogue:~/Downloads/spiderfoot$ # modules working together. A big thanks to +steve@rogue:~/Downloads/spiderfoot$ # contribution! +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ # We need to enable sfp_dnsresolve and sfp_d +steve@rogue:~/Downloads/spiderfoot$ # DNS records (the CNAMEs) during the scan, +steve@rogue:~/Downloads/spiderfoot$ # sfp_dnsbrute and even sfp_spider to find a +steve@rogue:~/Downloads/spiderfoot$ # that might point to a cloud service. Final +steve@rogue:~/Downloads/spiderfoot$ # enable sfp_subdomain_takeover to perform t +steve@rogue:~/Downloads/spiderfoot$ +steve@rogue:~/Downloads/spiderfoot$ steve@rogue:~/Downloads/spiderfoot$ # will see the malicious link as residing on +steve@rogue:~/Downloads/spiderfoot$ #enable sfp_subdomain_takeover to perform t + #enable sfp_subdomain_takeover to perform t + #enable sfp_subdomain_takeover to perform t + #enable sfp_subdomain_takeover to perform t +