A Python client for the crt.sh website to retrieve subdomains information
Project description
CertSPY - A Crt.sh Python Client
CertSPY is a Python client for interfacing with the crt.sh website, allowing users to retrieve information on subdomains from SSL certificate transparency logs.
Certificate Transparency (CT) is an open framework aimed at improving the safety of SSL/TLS certificates by creating an open and auditable log of all certificates issued by certificate authorities. It allows for the detection of mistakenly or maliciously issued certificates. In the context of reconnaissance (recon), cybersecurity experts and ethical hackers can utilize CT logs as a rich source of information for mapping the internet landscape. They can extract data about the existence of subdomains of a target domain, revealing potential targets for further investigation or penetration testing. This kind of intel can be vital in identifying vulnerable endpoints, tracking the issuance of new certificates, and generally maintaining a strong security posture against potential cyber threats. The tool crafted in the script leverages CT logs accessible through the crt.sh platform to facilitate such recon efforts, aiding in the timely identification of potential security vulnerabilities.
Features
- Query subdomain information from crt.sh.
- Support for wildcard and expired certificate queries.
- Command-line interface for easy usage.
Installation
You can clone the repository to your local machine using the following command:
git clone https://github.com/santosomar/certspy.git
Dependencies
- Python 3.x
requests
library
You can install the necessary Python packages using the following command:
pip install -r requirements.txt
Usage
You can use the client from the command line with the following syntax:
python crtsh_client.py secretcorp.org
This will query the crt.sh website for subdomains of secretcorp.org
and pretty print the JSON output to the console.
$ python3 certspy.py -h
usage: certspy.py [-h] domain
CertSPY: A Python client for the crt.sh website to retrieve subdomains information.
Author: Omar Santos (@santosomar).
positional arguments:
domain The domain to search for (e.g., websploit.org).
options:
-h, --help show this help message and exit
Contribution
Feel free to fork the repository and submit pull requests. For bug reports and feature requests, please create an issue in the GitHub issue tracker.
License
See LICENSE for more details.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file certspy-0.1.tar.gz
.
File metadata
- Download URL: certspy-0.1.tar.gz
- Upload date:
- Size: 3.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | dcc607be9c3a50ef561ba762e07ab629a30c35b21e4f5a70bbb2e2e06b9b2150 |
|
MD5 | 0234ab762b0c02552dcab7475283013d |
|
BLAKE2b-256 | 89762dd034cb1501056250f11581700b767b00e7d44c5ae394590b04313b3323 |
File details
Details for the file certspy-0.1-py3-none-any.whl
.
File metadata
- Download URL: certspy-0.1-py3-none-any.whl
- Upload date:
- Size: 3.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 668e176fad4370887254bffb6416652fb8441be4dbdab9f4f3e2d5619d4cee2d |
|
MD5 | c3cdaa20cd8ccbbfdf77d9d338e90209 |
|
BLAKE2b-256 | 41eeabb6669708f476a357f1e3f807b5fddf97d9e0cc17b731640fac751d5ae9 |