Funcionalidad:
Autodefinida como «The traditional Swiss army knife for OSINT». Está inspirada en Foca y Datasploit for OSINT.
- Whois(Indonesian TLD Support)
- Banner Grabbing
- Subdomain Enumeration Service
- Scanning for all Subdomain
- Machine Web Appalyzer
- Support DNS mapping / Zone Scanning
- Mail Harvester from Website & Search Engine
- Mail Harvester from MIT PGP Public Key
- Server Scrapping
- Public Document for Domain from Search Engine
- Fake and Random User Agent ( Prevent from blocking )
- Proxy Support for Harvesting
- Emails and Documents Public Git Finder in domain/subdomain
- Public SVN Finder in domain/subdomain
- Robot.txt Scraper in domain/subdomain
- Gather Public Company Info & Employee
- SQLite3 Database Support for storing Belati Results
- Setup Wizard/Configuration for Belati
- Django Web Management
- Webserver only mode
- Document Metadata/Exif Extractor Document Author Metadata
Datos de entrada:
-d DOMAIN Perform OSINT from Domain e.g petruknisme.com(without
protocol http/https)
-u USERNAME Perform OSINT from username e.g petruknisme
-e EMAIL Perform OSINT from email address
-c ORGCOMP Perform OSINT from Organization or Company Name, use
double quote
Ejemplo de uso:
https://www.youtube.com/watch?v=AGvsIWoaX_k
URL:
https://github.com/aancw/Belati
Instrucciones de instalación:
Con Python (2.7): https://github.com/aancw/Belati#installusage
Con Docker: https://github.com/aancw/Belati#docker-installation