Skip to content

Conversation

@LingeshwarKulal
Copy link

🔍 Attack Surface Mapper - OSINT Reconnaissance Tool

Description

This pull request adds the Attack Surface Mapper project to the All-In-One-Python-Projects collection. It's a comprehensive Python-based OSINT reconnaissance platform that combines multiple security research techniques.

What's Included

  • README.md: Complete project documentation with features, installation, and usage instructions
  • main.py: Professional entry point script with full CLI argument parsing for various reconnaissance options
  • requirements.txt: All necessary Python dependencies for the project

Key Features

Google Search API Reconnaissance - Intelligent dorking with automatic severity classification
🐙 GitHub API Secret Scanner - Detects hardcoded credentials and sensitive information
🌐 Subdomain Enumeration - Certificate Transparency queries and DNS brute-forcing
🔌 Port Scanner - Multi-threaded concurrent scanning with service identification
🔗 Correlation Engine - Merges findings and identifies critical combinations
📊 HTML Reports - Beautiful, client-ready report generation

Use Cases

  • VAPT Engagements
  • Bug Bounty Hunting
  • Red Team Operations
  • Security Audits
  • Continuous Monitoring

Target Audience

Beginner to Advanced Python learners interested in:

  • Cybersecurity
  • OSINT techniques
  • API integration
  • CLI application development

Requirements

  • Python 3.8 or higher
  • Google Custom Search API credentials
  • GitHub Personal Access Token

Original Repository

🔗 Full source code: github.com/LingeshwarKulal/attack-surface-mapper

Following Guidelines

✅ Code follows project style conventions
✅ Comprehensive documentation provided
✅ Example usage included
✅ Respects Code of Conduct
✅ Ready for beginner-to-advanced learners


This project enriches the All-In-One-Python-Projects collection with enterprise-grade security tooling for educational purposes.

Introduced comprehensive documentation for Attack Surface Mapper, detailing features, installation, usage, and requirements.
This script serves as the main entry point for the Attack Surface Mapper tool, providing various OSINT reconnaissance features. It includes argument parsing for target domains, configuration options, and different reconnaissance modules.
…apper

Added core dependencies and additional libraries for various functionalities.
Copilot AI review requested due to automatic review settings December 4, 2025 12:04
@github-actions
Copy link
Contributor

github-actions bot commented Dec 4, 2025

👋 @LingeshwarKulal 👋

We're delighted to have your pull request! Please take a moment to check our contributing guidelines and ensure you've filled out the PR template for a smooth process. We will review it soon.

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds the Attack Surface Mapper project to the All-In-One-Python-Projects collection. It's a comprehensive OSINT reconnaissance tool demonstrating security research techniques including Google dorking, GitHub secret scanning, subdomain enumeration, and port scanning capabilities. The implementation provides a professional CLI entry point with argument parsing, though it serves primarily as a demonstration that references the full implementation in an external repository.

Key Changes

  • Added complete project structure with README, main entry point, and dependencies list
  • Implemented CLI argument parser supporting multiple reconnaissance modules and configuration options
  • Documented comprehensive feature set for security professionals and learners

Reviewed changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated no comments.

File Description
Attack Surface Mapper/README.md Comprehensive documentation covering features, installation, usage examples, and security disclaimer
Attack Surface Mapper/main.py Professional CLI entry point with argparse implementation demonstrating the tool's interface
Attack Surface Mapper/requirements.txt Complete dependency list for the reconnaissance platform including API clients, security libraries, and development tools

Note: I identified several issues during the review (spelling error in main.py, path inconsistencies in README examples, and incorrect package names in requirements.txt), but the system indicates that no files are available in the current PR context for storing comments. This may indicate that the PR diff information was not properly provided to the review system. The issues I found include:

  1. Spelling error in main.py line 13: "Repositor" should be "Repository"
  2. Path inconsistency in README.md lines 54, 57, 60: Examples show python src/main.py but the actual file is at Attack Surface Mapper/main.py (without a src/ subdirectory)
  3. Incorrect package name in requirements.txt line 10: bs4==4.12.2 should be beautifulsoup4==4.12.2 (bs4 is not a valid PyPI package name)
  4. Redundant packages in requirements.txt lines 16-17: Both nmap==0.0.1 and python-nmap==0.0.1 are listed, which may cause confusion

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant