ONE-Type is a comprehensive reconnaissance and vulnerability scanning tool that automates the process of gathering information and identifying potential security weaknesses in web applications. It is designed for security professionals, developers, and bug bounty hunters who need a streamlined and efficient way to perform initial security assessments.
ONE-Type is now available in two modes: a modern, user-friendly Graphical User Interface (GUI) and a powerful, interactive Command-Line Interface (CLI).
- Modern and Intuitive Design: Built with
customtkinterfor a sleek and visually appealing user experience. - Interactive Tool Selection: Easily select the tools you want to run with checkboxes.
- Real-Time Progress: Monitor the progress of each scan with individual progress bars.
- Cross-Platform: Works on Windows, macOS, and Linux.
- Easy to Use: No command-line experience required.
- Interactive and User-Friendly: Powered by
richandinquirerfor a beautiful and intuitive command-line experience. - Menu-Driven Interface: Easily navigate through the available options and tool-specific templates.
- Extensive Toolset: Access a wide array of reconnaissance and scanning tools, each with multiple configurable options.
- Real-Time Progress: Keep track of scan progress with animated progress bars.
- Cross-Platform: Works on Windows, macOS, and Linux.
- Powerful and Flexible: Ideal for automation and scripting, offering professional-grade control.
- NSLOOKUP: Get DNS information.
- HOST: Get IP and other information about the host.
- WHOIS: Get WHOIS information for a domain.
- DIG: Get detailed DNS records.
- WIG: Web server and application fingerprinting.
- NMAP: Network scanning and host discovery with various scan types (e.g., Service/OS detection, aggressive, ping scan, specific ports).
- SUBDOMAIN (Assetfinder): Subdomain enumeration with options for resolved IPs, verbose output, etc.
- Subfinder: Fast passive subdomain enumeration with options for silent mode, custom resolvers, thread configuration, and timeout.
- HTTPX: A fast and multi-purpose HTTP toolkit for probing multiple hosts with options for status code filtering, title extraction, technology detection, custom HTTP methods, and proxy usage.
- Naabu: A fast port scanner with templates for default, specific, ranged, and full port scans, along with options to exclude ports and set rate limits.
- Nuclei: A fast and customizable vulnerability scanner with templates for default scans (all templates), specific templates, severity filtering, template exclusion, rate limiting, and verbose output.
- Amass: A powerful network mapping tool for attack surface mapping and asset discovery, offering passive, active, or full enumeration, data source configuration, custom resolvers, and JSON output.
- WEBSCAN: Basic web vulnerability scanning for common web application vulnerabilities (SQL Injection, XSS, CSRF, File Inclusion, Command Injection).
- DNSRECON: Advanced DNS enumeration with options for zone transfer, standard enumeration, brute force with wordlists, and custom name servers.
- Python 3.x
pip- External Tools:
subfinder,httpx,naabu,nuclei,amass
-
Clone the repository:
git clone https://github.com/your-username/ONE-Type.git cd ONE-Type -
Create and activate a Python Virtual Environment (Recommended):
python3 -m venv venv source venv/bin/activate -
Install Python dependencies:
python3 setup.py
This script will install all required Python packages and check for the presence of external tools.
The CLI utilizes several powerful external command-line tools (mostly written in Go). These are not installed automatically by setup.py and need to be installed manually.
Common Installation Method (using go install - requires Go language installed):
- Subfinder:
go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest - httpx:
go install github.com/projectdiscovery/httpx/cmd/httpx@latest - Naabu:
go install github.com/projectdiscovery/naabu/v2/cmd/naabu@latest - Nuclei:
go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest - Amass:
go install github.com/owasp-amass/amass/v3/...@master
Important:
- Ensure you have Go installed on your system.
- After installing, ensure your Go binary path is correctly configured:
- Linux/macOS: Add
export PATH=$PATH:~/go/binto your shell profile (e.g.,~/.bashrc,~/.zshrc) and restart your terminal. - Windows: Add
%USERPROFILE%\go\binto your system's PATH environment variable (via System Properties -> Environment Variables).
- Linux/macOS: Add
- Refer to each tool's official documentation for specific installation instructions if
go installdoesn't work or for alternative methods.
You can run ONE-Type in either GUI mode or CLI mode.
To run the GUI, simply execute the onetype.py script without any arguments:
python3 onetype.pyTo run the CLI, pass the cli argument to the onetype.py script:
python3 onetype.py cliOnce in CLI mode, you will be presented with interactive menus to select tools and configure their specific options and templates.
All scan results are saved in the output directory. The filenames are prefixed with the tool name and the target domain (e.g., nslookup-result-example.com.txt).
Contributions, issues, and feature requests are welcome! Feel free to check the issues page.
This project is licensed under the MIT License - see the LICENSE file for details.

