theHarvester – Advanced Information Gathering Tool for Pentesters & Ethical Hackers

The objective of this Information Gathering Tool is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers, and SHODAN computer database.

This tool is intended to help Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.

This tool is designed to help the penetration tester on an earlier stage; it is effective, simple and easy to use. The sources supported are:

  1. Google – emails, subdomains
  2. Google profiles – Employee names
  3. Bing search – emails, subdomains/hostnames, virtual hosts
  4. Pgp servers – emails, subdomains/hostnames
  5. LinkedIn – Employee names
  6. Exalead – emails, subdomains/hostnames

New features:

  1. Time delays between requests
  2. XML results export.

Also Read: FIREWALK – Active Reconnaissance Network Security Tool

How it works – Information Gathering Tool

#theHarvester -d [url] -l 300 -b [search engine name]

#theHarvester -d -l 300 -b google

-d [url] will be the remote site from which you wants to fetch the juicy information.

-l will limit the search for specified number.

-b is used to specify search engine name.

Tool Location:

Information Gathering Tool

theHarvester Options:

Information Gathering Tool

How to Find Email ID’s in Domain:

Example #1:

Information Gathering Tool

Example #2:


Download and Install the complete Package of theHarvester – Information Gathering Tool from GitHub.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.


Please enter your comment!
Please enter your name here