Z3nHawk is evolving into a powerful Automated Pentest Framework, focusing on reconnaissance, scanning, exploit mapping, and reporting. This update is a step toward making it a full-fledged cybersecurity tool. π₯ Updated Z3nHawk Project with New Features & Enhancements!
This latest version of Z3nHawk brings significant improvements, making it a more robust and efficient reconnaissance tool for cybersecurity professionals and ethical hackers.
- WHOIS Lookup β Retrieves domain registration details.
- DNS Records β Extracts A, MX, and TXT records.
- IP Geolocation β Fetches ASN, ISP, and country details.
- HTTP Headers β Analyzes response headers for security insights.
- SSL/TLS Certificate Details β Checks certificate validity and issuer.
- Port Scanning β Scans all 65,535 ports to identify open services. π₯ What's New in 2.0? β Swift Subdomain Enumeration β Faster and more efficient discovery. β CVE Finder β Identify vulnerabilities with structured CVE lookup. β Tabular Result System β Clean, organized, and easy-to-read outputs.
-
Clone the repository:
git clone https://github.com/Mayberyzen/Z3NHAWK.git cd Z3NHAWK
-
Install dependencies:
pip install -r requirements.txt
Run the tool by executing:
python z3nhawk.py
Then enter a target IP or domain when prompted.
Contributions are welcome! If you have ideas for improvements, feel free to open an issue or submit a pull request.
This project is licensed under the MIT License.