Skip to content

mathfaria/Layla

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WELCOME TO LAYLA

example

Layla is a python script that automatically performs recon on a
given URL. It combines the outputs of other known tools into a single one.


🚀 Getting Started

To start, make sure that you're using a Debian-based distro, like Kali Linux, for example. Since the script uses Python3 to run, it's essential to have it installed on your machine.

  1. Cloning the project:
git clone https://github.com/mthf0/layla.git
  1. Get into the project' folder:
cd layla/
  1. Install all dependencies
chmod +x install.sh & sudo ./install.sh
  1. Run the script
python3 layla.py --url owasp.org

🚔 Features:


📝 TODO's:

This script needs a lot of improvements, which I'll definitely add with time. I'll list some of them below:

  • Fine-tune some parameters from:
    • NMAP
    • AMASS
  • Add subdomain takeover detection with subjack.
  • Add visual recon, aquatone would be nice for that.
  • Add permutation scanning using dnsgen.
  • Add certificate search from crt.sh. (automated script)
  • Add GitHub recon.

About

[EN] BETA: Layla - recon tool for bug bounty

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published