Collection of scripts to automate boring penetration testing workflows
Validates whether resolved FQDNs are in scope for an engagement.
Capabilities:
- Reads a list of targets (
--targets) containing FQDNs (e.g.api.example.com). - Resolves DNS
Arecords for each target. - Compares each resolved IP against an engagement scope file (
--scope) that currently supports exact IP matches (one IP per line). - Exports results to an Excel file (
--output).
Example usage:
python3 scope.py -t subs.txt -s scope.txt -o results.xlsxCapabilities:
- Read a list of assets (IP:PORT format)
- Exports results to an Excel file (
--output).
Example usage:
python3 sort_ports.py -a assets.txt -o results.xlsx# create venv
python3 -m venv .venv
# activate (Linux / macOS)
source .venv/bin/activate
# install dependencies
pip install -r requirements.txt