Z3nHawk is evolving into a powerful Automated Pentest Framework, focusing on reconnaissance, scanning, exploit mapping, and reporting. This update is a step toward making it a full-fledged cybersecurity tool. 🔥 Updated Z3nHawk Project with New Features & Enhancements!
This latest version of Z3nHawk brings significant improvements, making it a more robust and efficient reconnaissance tool for cybersecurity professionals and ethical hackers.
- WHOIS Lookup – Retrieves domain registration details.
- DNS Records – Extracts A, MX, and TXT records.
- IP Geolocation – Fetches ASN, ISP, and country details.
- HTTP Headers – Analyzes response headers for security insights.
- SSL/TLS Certificate Details – Checks certificate validity and issuer.
- Port Scanning – Scans all 65,535 ports to identify open services. 🔥 What's New in 2.0? ✅ Swift Subdomain Enumeration – Faster and more efficient discovery. ✅ CVE Finder – Identify vulnerabilities with structured CVE lookup. ✅ Tabular Result System – Clean, organized, and easy-to-read outputs.
-
Clone the repository:
git clone https://github.com/Mayberyzen/Z3NHAWK.git cd Z3NHAWK
-
Install dependencies:
pip install -r requirements.txt
Run the tool by executing:
python z3nhawk.py
Then enter a target IP or domain when prompted.
Contributions are welcome! If you have ideas for improvements, feel free to open an issue or submit a pull request.
This project is licensed under the MIT License.