Coloring added

This commit is contained in:
Dionysus 2023-11-23 04:33:52 -05:00
parent 4cf3df7e2c
commit 1b3fb6b722
Signed by: acidvegas
GPG Key ID: EF4B922DB85DC9DE
3 changed files with 24 additions and 8 deletions

BIN
.screens/preview.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 74 KiB

View File

@ -2,6 +2,8 @@
PTRStream is an asynchronous reverse DNS lookup tool developed in Python. It generates random IP addresses and performs reverse DNS lookups using various DNS servers.
![](.screens/preview.png)
## Requirements
- [python](https://www.python.org/)
- [aiodns](https://pypi.org/project/aiodns/) *(pip install aiodns)*
@ -21,8 +23,6 @@ python ptrstream.py [options]
## Now what?
The results are cached and saved to a file named ptr_{date}_{seed}.txt after every 1000 successful lookups. After a full loop through every IP address, a new seed will generate and start the scan again.
Might add coloring based on classification *(government, data cetner, etc)*
Output to elastic search possibly.
Still a work in progress I guess...
Still a work in progress I guess...

View File

@ -87,12 +87,28 @@ async def main():
for task in done:
ip, result = task.result()
if result:
for exclude in ('undefined.hostname.localhost', 'localhost', '127.0.0.1'):
if result == exclude:
continue
print(f'\033[96m{ip.ljust(15)}\033[0m \033[90m->\033[0m \033[93m{result}\033[0m')
if result in ('127.0.0.1','localhost'):
print(f'\033[35m{ip.ljust(15)}\033[0m \033[90m-> {result}\033[0m')
elif ip in result:
result = result.replace(ip, f'\033[96m{ip}\033[93m')
elif (daship := ip.replace('.', '-')) in result:
result = result.replace(daship, f'\033[96m{daship}\033[93m')
print(f'\033[35m{ip.ljust(15)}\033[0m \033[90m->\033[0m \033[93m{result}\033[0m')
elif (revip := '.'.join(ip.split('.')[::-1])) in result:
result = result.replace(revip, f'\033[96m{revip}\033[93m')
print(f'\033[35m{ip.ljust(15)}\033[0m \033[90m->\033[0m \033[93m{result}\033[0m')
elif result.endswith('.gov') or result.endswith('.mil'):
result = result.replace('.gov', f'\033[31m.gov\033[0m')
result = result.replace('.mil', f'\033[31m.gov\033[0m')
print(f'\033[35m{ip.ljust(15)}\033[0m \033[90m->\033[0m \033[93m{result}\033[0m')
elif '.gov.' in result or '.mil.' in result:
result = result.replace('.gov.', f'\033[31m.gov.\033[0m')
result = result.replace('.mil.', f'\033[31m.mil.\033[0m')
print(f'\033[35m{ip.ljust(15)}\033[0m \033[90m->\033[0m \033[93m{result}\033[0m')
else:
scary = ('.gov')
print(f'\033[35m{ip.ljust(15)}\033[0m \033[90m->\033[0m \033[93m{result}\033[0m')
results_cache.append(f'{ip}:{result}')
if len(results_cache) >= 1000:
stamp = time.strftime('%Y%m%d')
with open(f'ptr_{stamp}_{seed}.txt', 'a') as file: