Nuubi is a powerful information gathering and network reconnaissance scanning tool. This tool is developed based on the Python language, so it has strong cross-platform capabilities. Researchers can easily use Nuubi to complete tasks such as information gathering, network reconnaissance, and network scanning.
In short, Nuubi is a network reconnaissance and scanning tool developed for penetration testing. In the process of penetration testing, network reconnaissance is often the first stage of the task. Therefore, before executing real attacks, we need to collect detailed information about the target. Nuubi is a very fast network reconnaissance tool that can help penetration testers complete the first stage of network reconnaissance tasks at the fastest speed.
Function Introduction:
Information Gathering Module:
- Banner Retrieval
- Subnet Query
- CMS Detection
- Certificate Transparency Log Monitoring
- DNS Query
- Link Extraction
- IP Geolocation Query
- HTTP Header
- Nmap Scanning
- Subdomain Query
- Traceroute
- Find Host Shared DNS Servers
- URL and Website Scanning to Identify Potential Malicious Websites
- GitHub Username Query
- Whois Information Query
- Web Crawler
- Reverse IP
- Reverse DNS
- DNS Zone Transfer
- Nping Ping Response Testing
- ASN Detection
- Cloudflare Cookie Collection
- Response Status Code Detection
Tool Menu:
Options:
- -h/--help: Display help information and exit
Arguments:
- -b/--banner: Retrieve the banner information of the target IP address
- -s/--subnet: Scan the target subnet
- -c/--cms: Use header scanning to detect CMS
- -d/--dns: Perform DNS queries for the target domain
- -e/--extract: Extract link addresses from the target URL (https/http)
- -H/--http: Retrieve the HTTP header information of the target URL
- -n/--nmap: Perform Nmap scanning for the target domain
- -S/--sub: Perform subdomain scanning for the target domain
- -f/--find: Find shared NDS servers of the target host
- -u/--username: Get the GitHub username of the target
- -w/--whois: Perform Whois queries for the target domain
- -C/--crawl: Crawl the target URL
- -r/--reverse: Perform reverse IP queries
- -z/--zone: Perform zone transfer to get DNS Zone
- --asn: Check ASN
- --nping: Nping, test Ping response
- --cookie: Get Cloudflare cookie
- --revdns: Reverse DNS
- --cert: Monitor certificate transparency logs
- --url: Perform URL and website scanning to detect potential malicious websites
- --response: Detect response status codes
- --exj: Extract GET parameters from JavaScript files
- -ip: Query the geographic location information of the target IP address
- -T: Traceroute
Tool Installation:
On operating systems such as Kali Linux, Parros OS, and Ubuntu, researchers can use the following commands to install and use Nuubi:
root@kali~# git clone https://github.com/pikpikcu/nuubi.git
root@kali~# pip install -r requirements.txt
root@kali~# python3 nuub.py -h
On the Termux platform, researchers can use the following commands to install and use Nuubi:
pikpik~$ pkg install python git ncurses-bin -y
pikpik~$ git clone https://github.com/pikpikcu/nuubi.git | cd nuubi
pikpik~$ pip install -r requirements.txt
pikpik~$ python3 nuub.py –h
Tool Usage Example:
python3 nuub.py "arguments" example.site
Where "arguments" are the parameters required to run Nuubi, and "example.site" is the target domain or IP address.
Project Address:
Nuubi: [https://github.com/pikpikcu/nuubi]