Recon Tool: Is it alive?
Reading Time: 2 Minutes
What is Is it Alive?
This tool is written by us for Bug Bounty Hunters, Pentesters and Red teams with speed in mind. When performing Recon, depending on the tools you will use, even if passive or active techniques are used, you will end up with huge lists of IP addresses, Hosts, URLs, and Subdomains. But as we know Bug Bounty for example is all about time management and working smart. From these hosts/URL’s/IPs especially if they are huge, we know that many are either from the Wayback machine, or any source, that often is not alive or no longer available, so using this tool, on any of these will immediately probe them and save them into two files, Valid and Invalid so that you can work more efficiently and never waste time on hosts that are no longer valid!
See Also: So you want to be a hacker?
Complete Offensive Security and Ethical Hacking Course
Installation
git clone https://github.com/blackhatethicalhacking/isitalive.git
cd isitalive
chmod +x isitalive.sh
isitalive.sh -h
Instructions
All you have to do when you run this tool is provide it with a list of:
- IP addresses
- Hosts
- Subdomains
- URLs
This way:
isitalive.sh target.txt
It will then start probing and saving in real-time the results under output with Valid and Invalid files.
Trending: OSINT Tool: Blackbird
Screenshots
Main Menu
Compatibility
Tested on Kali Linux, Parrot OS, MacOS
Disclaimer
This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool. We use it to test under NDA agreements with clients and their consents for Pentesting purposes and we never encourage to misuse or take responsibility for any damage caused!
Clone the repo from here: GitHub Link