Recon Tool: Is it alive?

by | Aug 19, 2022 | Tools

Premium Content

Patreon

Subscribe to Patreon to watch this episode.

Reading Time: 2 Minutes

 

What is Is it Alive?

This tool is written by us for Bug Bounty Hunters, Pentesters and Red teams with speed in mind. When performing Recon, depending on the tools you will use, even if passive or active techniques are used, you will end up with huge lists of IP addresses, Hosts, URLs, and Subdomains. But as we know Bug Bounty for example is all about time management and working smart. From these hosts/URL’s/IPs especially if they are huge, we know that many are either from the Wayback machine, or any source, that often is not alive or no longer available, so using this tool, on any of these will immediately probe them and save them into two files, Valid and Invalid so that you can work more efficiently and never waste time on hosts that are no longer valid!

 

See Also: So you want to be a hacker?
Complete Offensive Security and Ethical Hacking Course

Installation

git clone https://github.com/blackhatethicalhacking/isitalive.git

cd isitalive

chmod +x isitalive.sh

isitalive.sh -h

 

 

Instructions

All you have to do when you run this tool is provide it with a list of:

  • IP addresses
  • Hosts
  • Subdomains
  • URLs

This way:

isitalive.sh target.txt

It will then start probing and saving in real-time the results under output with Valid and Invalid files.

 

Screenshots

Main Menu

Is it alive

 

 

Compatibility

Tested on Kali Linux, Parrot OS, MacOS

 

Disclaimer

This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool. We use it to test under NDA agreements with clients and their consents for Pentesting purposes and we never encourage to misuse or take responsibility for any damage caused!

 

Clone the repo from here: GitHub Link

 

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This