Nuubi is a powerful information gathering and network reconnaissance scanning tool. This tool is developed based on the Python language, so it has strong cross-platform capabilities. Researchers can easily use Nuubi to complete tasks such as information gathering, network reconnaissance, and network scanning.
In short, Nuubi is a network reconnaissance and scanning tool developed for penetration testing. In the process of penetration testing, network reconnaissance is often the first stage of the task. Therefore, before executing real attacks, we need to collect detailed information about the target. Nuubi is a very fast network reconnaissance tool that can help penetration testers complete the first stage of network reconnaissance tasks at the fastest speed.
Function Introduction:
Information Gathering Module
- Banner Retrieval
- Subnet Query
- CMS Detection
- Certificate Transparency Log Monitoring
- DNS Query
- Link Extraction
- IP Geolocation Query
- HTTP Header
- Nmap Scanning
- Subdomain Query
- Traceroute
- Find Host Shared DNS Servers
- URL and Website Scanning to Identify Potential Malicious Websites
- GitHub Username Query
- Whois Information Query
- Web Crawler
- Reverse IP
- Reverse DNS
- DNS Zone Transfer
- Nping Ping Response Testing
- ASN Detection
- Cloudflare Cookie Collection
- Response Status Code Detection
Tool Menu
Options:
- -h/--help: Display help information and exit
Arguments:
- -b/--banner: Get the Banner information of the target IP address
- -s/--subnet: Scan the target subnet
- -c/--cms: Use Header scanning to detect CMS
- -d/--dns: Perform DNS query for the target domain name
- -e/--extract: Extract link addresses from the target URL (https/http)
- -H/--http: Get the HTTP Header information of the target URL
- -n/--nmap: Perform Nmap scanning for the target domain name
- -S/--sub: Perform subdomain scanning for the target domain name
- -f/--find: Find shared NDS servers of the target host
- -u/--username: Get the Github username of the target
- -w/--whois: Perform Whois query for the target domain name
- -C/--crawl: Crawl the target URL
- -r/--reverse: Perform reverse IP query
- -z/--zone: Perform zone transfer to get DNS Zone
- --asn: Check ASN
- --nping: Nping, test Ping response
- --cookie: Get Cloudflare cookie
- --revdns: Reverse DNS
- --cert: Certificate Transparency Log Monitoring
- --url: Perform URL and website scanning to detect potential malicious websites
- --response: Detect response status code
- --exj: Extract GET parameters from JavaScript files
- -ip: Query the geographical location information of the target IP address
- -T: Traceroute
Tool Installation:
On operating systems such as Kali Linux, Parros OS, and Ubuntu, researchers can use the following commands to install and use Nuubi:
root@kali~# git clone https://github.com/pikpikcu/nuubi.git
root@kali~# pip install -r requirements.txt
root@kali~# python3 nuub.py -h
On the Termux platform, researchers can use the following commands to install and use Nuubi:
pikpik~$ pkg install python git ncurses-bin -y
pikpik~$ git clone https://github.com/pikpikcu/nuubi.git | cd nuubi
pikpik~$ pip install -r requirements.txt
pikpik~$ python3 nuub.py –h
Tool Usage Example:
python3 nuub.py "arguments" example.site
Where "arguments" are the parameters required to run Nuubi, and "example.site" is our target domain name or IP address.
Project Address:
Nuubi: [https://github.com/pikpikcu/nuubi]