Tutorial on using the automated information collection tool Mizuze

Tutorial on using the automated information collection tool Mizuze

1. Mizusawa Introduction & Installation

One-stop service, you only need to enter the root domain name to collect related assets in an all-round way and detect vulnerabilities. You can also enter multiple domain names, C-segment IP, etc.

Development language: Python3

Mizusawa download address

Preparation before installation:

  • The current user has write permissions for this directory, otherwise the scan results cannot be generated. Just root permissions
  • The Python environment must be 3.7 or above because asynchronous is used. It is recommended that the VPS environment is ubuntu20, and the default is python3.8. When installing the module, remember not to use Douban sources.
  • iniFile/config.iniAdd api (fofa, shodan, github, virustotal) to the configuration file

Installation process (sh script method, high failure rate):

Download the pip package (it will take a long time, please be patient)

chmod 777 build.sh
./build.sh

Guess you like

Origin blog.csdn.net/Gherbirthday0916/article/details/131720751