______ _ _____ _ _ __
| ____| | | | __ \ (_) | | / /
| |__ ___ ___ | |_ | |__) |_ __ _ _ __ __ | |_/ /
| __/ _ \ / _ \ | __| | ___/| '__| | '_ \/ _| __/ /
| | | (_) | (_) | | |_ | | | | | | | | |_| |_/ /
|_| \___/ \___/ \__| |_| |_| |_|_| |\__|___/
_/ |
|__/
Automated Passive Reconnaissance Tool
Gather comprehensive information about your target domain without active scanning
- Overview
- Features
- Installation
- Usage
- Dependencies
- Report Output
- Examples
- Uninstallation
- Contributing
- License
FootPrintX is a powerful passive reconnaissance tool designed for security researchers, penetration testers, and IT professionals. It performs comprehensive information gathering on target domains using publicly available data sources without generating suspicious network traffic.
- π 100% Passive - No active scanning or intrusive probes
- π Comprehensive Reports - Markdown formatted reports with all findings
- π― Targeted Enumeration - DNS, WHOIS, SSL certificates, subdomains, and more
- π Easy to Use - Simple command-line interface
- π Detailed Logging - Track all operations with verbose mode
| Module | Description | Professional Level |
|---|---|---|
| π WHOIS Lookup | Domain registration details, registrar, dates, and nameservers | Basic |
| π DNS Enumeration | A, AAAA, MX, NS, TXT, CNAME, and SOA records | Basic |
| π DNS Zone Transfer | Test for AXFR vulnerability on nameservers | β Advanced |
| π Subdomain Discovery | Dictionary-based subdomain enumeration with IP resolution | Basic |
| π Advanced Subdomain Enum | Certificate Transparency logs and comprehensive brute-force | ββ Advanced |
| π SSL Certificate Analysis | Certificate transparency logs via crt.sh | Basic |
| π§ Email Harvesting | Discover email addresses from public sources | β Advanced |
| π Web Search | Passive URL discovery through search engines | Basic |
| βοΈ Technology Detection | Server identification and technology stack analysis | Basic |
| π‘οΈ Security Headers Analysis | Comprehensive security posture assessment (HSTS, CSP, etc.) | ββ Advanced |
| π Port Detection | Common ports detection (HTTP, HTTPS, SSH, FTP, etc.) | β Advanced |
| βοΈ Cloud Infrastructure | Identify cloud providers (AWS, Azure, GCP, Cloudflare, etc.) | ββ Advanced |
| π Automated Reporting | Markdown reports with complete findings and timestamps | Basic |
- AXFR Zone Transfer Detection: Automatically tests all nameservers for misconfigured zone transfers
- Vulnerability Assessment: Identifies insecure DNS configurations
- Security Recommendations: Provides actionable insights
Comprehensive analysis of HTTP security headers:
Strict-Transport-Security(HSTS)Content-Security-Policy(CSP)X-Frame-Options(Clickjacking protection)X-Content-Type-OptionsX-XSS-ProtectionReferrer-PolicyPermissions-Policy
- Passive email harvesting from public sources
- Common email pattern generation
- DNS TXT record mining
- Search engine discovery
- Provider Detection: AWS, Azure, Google Cloud, DigitalOcean, Cloudflare
- IP Geolocation: Identify hosting regions
- CDN Detection: Cloudflare, Akamai, AWS CloudFront
- Reverse IP Analysis: WHOIS-based provider identification
- Certificate Transparency: Query crt.sh for historical subdomains
- Active Status Checking: Verify if discovered subdomains are live
- Comprehensive Wordlist: Extended common subdomain patterns
- IP Resolution: Map all subdomains to their IP addresses
- β Automatic dependency checking
- β Custom wordlist support
- β Configurable output directory
- β Verbose logging mode
- β Color-coded terminal output
- β Timestamped reports
- β Professional-grade reconnaissance
- β Vulnerability detection
- β Security posture assessment
- Linux-based operating system (Kali Linux, Ubuntu, Debian, etc.)
- Root/sudo access for installation
- Internet connection
# Clone the repository
git clone https://github.com/MahdiDbh/FootPrintX.git
cd FootPrintX
# Make scripts executable
chmod +x install.sh footprintx.sh
# Install globally (requires sudo)
sudo ./install.shThe installation script will:
- Copy files to
/opt/footprintx/ - Create a global command symlink in
/usr/local/bin/footprintx - Set up proper permissions
- Make the tool available system-wide
After installation, verify that FootPrintX is properly installed:
# Check if the command is available
which footprintx
# Should output: /usr/local/bin/footprintx
# Test the installation
footprintx -h
# Check installation directory
ls -la /opt/footprintx/If you prefer not to install globally, you can run the tool directly:
chmod +x footprintx.sh
./footprintx.sh -d example.comFootPrintX requires the following tools to function properly. The tool will automatically check for missing dependencies on startup.
DNS lookup utilities for domain enumeration.
# Ubuntu/Debian/Kali Linux
sudo apt-get update
sudo apt-get install dnsutils
# Red Hat/CentOS/Fedora
sudo yum install bind-utils
# Arch Linux
sudo pacman -S bind-tools
# macOS (using Homebrew)
brew install bindWHOIS client for domain registration information.
# Ubuntu/Debian/Kali Linux
sudo apt-get update
sudo apt-get install whois
# Red Hat/CentOS/Fedora
sudo yum install whois
# Arch Linux
sudo pacman -S whois
# macOS (usually pre-installed, or use Homebrew)
brew install whoisCommand-line tool for transferring data with URLs.
# Ubuntu/Debian/Kali Linux
sudo apt-get update
sudo apt-get install curl
# Red Hat/CentOS/Fedora
sudo yum install curl
# Arch Linux
sudo pacman -S curl
# macOS (usually pre-installed, or use Homebrew)
brew install curlWeb scanner for technology detection and fingerprinting.
# Ubuntu/Debian/Kali Linux
sudo apt-get update
sudo apt-get install whatweb
# Alternative: Install from source
git clone https://github.com/urbanadventurer/WhatWeb.git
cd WhatWeb
sudo make install
# Kali Linux (usually pre-installed)
# If not installed:
sudo apt-get install whatweb# For Ubuntu/Debian/Kali Linux (Recommended)
sudo apt-get update && sudo apt-get install -y dnsutils whois curl whatweb
# For Red Hat/CentOS/Fedora
sudo yum install -y bind-utils whois curl
# For Arch Linux
sudo pacman -Sy bind-tools whois curlCheck if all dependencies are installed:
# Check required tools
dig -v
whois --version
curl --version
# Check optional tools
whatweb --versionNote: FootPrintX will automatically detect missing dependencies and provide specific installation instructions when you run it.
footprintx -d <domain>Required:
-d <domain> Target domain to analyze
Optional:
-o <directory> Output directory (default: reports/)
-w <wordlist> Custom wordlist for subdomain enumeration
-v Enable verbose mode for detailed logging
-h Display help message
footprintx -d example.comfootprintx -d example.com -o /tmp/my-reportsfootprintx -d example.com -vfootprintx -d example.com -w /path/to/custom-wordlist.txtfootprintx -d example.com -o /tmp/reports -w custom-subdomains.txt -vFootPrintX generates comprehensive Markdown reports in the specified output directory.
reports/
βββ example.com_20251215_143022.md
Each report includes:
-
Report Header
- Generation date and time
- Tool version
- Target domain
-
WHOIS Information
- Domain registrar
- Registration and expiry dates
- Nameservers
- Complete WHOIS data
-
DNS Enumeration
- All DNS record types (A, AAAA, MX, NS, TXT, CNAME, SOA)
- Discovered subdomains with IP addresses
-
DNS Zone Transfer Test β
- AXFR vulnerability testing on all nameservers
- Security assessment of DNS configuration
- Detailed zone transfer results if vulnerable
-
Advanced Subdomain Enumeration ββ
- Certificate Transparency logs
- Active/inactive subdomain status
- Extended brute-force results
-
Email Harvesting β
- Discovered email addresses
- Common email patterns
- Source attribution
-
SSL Analysis
- Domains found in SSL certificates
- Certificate transparency logs
-
Passive Web Search
- URLs discovered via search engines
-
Technology Detection
- Web server information
- HTTP headers analysis
- Technology stack identification
-
Security Headers Analysis ββ
- Complete security headers audit
- Vulnerability assessment
- Missing security controls
- Clickjacking and XSS protection status
-
Port Detection β
- Common ports scan (80, 443, 22, 21, etc.)
- Service identification
- Open/closed status
-
Cloud Infrastructure Detection ββ
- Cloud provider identification
- CDN detection
- IP geolocation
- Hosting provider details
# π― Passive Reconnaissance Report - example.com
**Generation Date:** 2025-12-15 14:30:22
**Tool:** FootPrintX v1.0
**Target Domain:** example.com
---
## π WHOIS Information
| Information | Value |
|-------------|-------|
| Domain | example.com |
| Registrar | Example Registrar Inc. |
| Creation Date | 1995-08-14 |
| Expiry Date | 2026-08-13 |
### Name Serversns1.example.com ns2.example.com
---
## π DNS Zone Transfer Test
β
**ns1.example.com** - Zone transfer denied (secure)
β
**ns2.example.com** - Zone transfer denied (secure)
**Result:** All nameservers properly configured against zone transfer attacks.
---
## π‘οΈ Security Headers Analysis
| Header | Status | Value |
|--------|--------|-------|
| Strict-Transport-Security | β
Present | `max-age=31536000` |
| Content-Security-Policy | β Missing | - |
| X-Frame-Options | β
Present | `DENY` |
| X-Content-Type-Options | β
Present | `nosniff` |
### π Security Assessment
- β οΈ **No CSP detected** - Potential XSS vulnerability
---
## βοΈ Cloud Infrastructure Detection
| IP Address | Cloud Provider | Region |
|------------|----------------|--------|
| 93.184.216.34 | AWS (Amazon) | Amazon Data Services |
**CDN Detected:** Cloudflare
---
## π§ Advanced Configuration
### Custom Wordlist
Create your own subdomain wordlist:
```bash
# Create a custom wordlist
cat > my-subdomains.txt << EOF
www
mail
ftp
admin
test
dev
staging
api
blog
portal
EOF
# Use it with FootPrintX
footprintx -d example.com -w my-subdomains.txt
The tool includes a default wordlist located at:
/opt/footprintx/wordlists/subdomains.txt
To remove FootPrintX from your system:
cd FootPrintX
sudo ./uninstall.shThis will:
- Remove all files from
/opt/footprintx/ - Remove the global command from
/usr/local/bin/footprintx - Clean up all installation artifacts
- Always obtain proper authorization before scanning any domain
- Unauthorized reconnaissance may be illegal in your jurisdiction
- The authors are not responsible for misuse or damage caused by this tool
- Use responsibly and ethically
Contributions are welcome! Here's how you can help:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
- Additional reconnaissance modules (Shodan integration, VirusTotal API)
- Enhanced reporting formats (HTML, JSON, PDF, XML)
- Integration with other OSINT tools (theHarvester, Maltego)
- Performance optimizations and parallel processing
- Additional subdomain enumeration techniques (DNS brute-force, permutations)
- WAF detection and bypass techniques
- GraphQL endpoint discovery
- API endpoint enumeration
- Directory brute-forcing integration
- Social media OSINT
- Dark web monitoring
- Real-time threat intelligence feeds
- Initial release
- WHOIS lookup functionality
- DNS enumeration (A, AAAA, MX, NS, TXT, CNAME, SOA records)
- Subdomain discovery with wordlist support
- Advanced Features:
- π DNS Zone Transfer (AXFR) vulnerability testing
- π§ Email harvesting from public sources
- π‘οΈ Security headers analysis (HSTS, CSP, X-Frame-Options, etc.)
- π Common port detection and service identification
- βοΈ Cloud infrastructure detection (AWS, Azure, GCP, Cloudflare)
- π Advanced subdomain enumeration via Certificate Transparency
- βοΈ Enhanced technology stack detection
- SSL certificate analysis via crt.sh
- Web search integration
- Markdown report generation with timestamps
- Verbose logging and color-coded output
- Professional-grade security assessment
- Inspired by various OSINT and reconnaissance tools in the security community
- Thanks to all contributors and testers
- Author: MahdiDbh
- GitHub: @MahdiDbh
- Repository: FootPrintX
This project is licensed under the MIT License - see the LICENSE file for details.
Made with β€οΈ for the security community
β If you find this tool useful, please consider giving it a star!