Premium Only Content

theHarvester Tutorial: Collect Emails, Subdomains, and More
theHarvester is a powerful tool used in Kali Linux for gathering emails, subdomains, hosts, employee names, open ports, and banners from different public sources like search engines, PGP key servers, and more.
TheHarvester
00:20 - theHarvester introduction
01:12 - Installation of theHarvester
01:22 - searching sweshi.com
02:10 - looking at some results
03:10 - searching cyber academy
03:47 - looking at the options
Reconnaissance tutorials
Google Footprinting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/GoogleFootprinting.php
theHarvester tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/theHarv3ster%20-%20Network%20Reconnaissance%20tool%20tutorial.php
sublister tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sublist3r%20tutorial.php
censys free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/censys%20tutorial.php
shodan free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/shodan%20tutorial.php
dns dumpster tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dns%20dumpster%20tutorial.php
spiderfoot tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/spiderfoot%20tutorial.php
nmap tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Nikto web server scanning Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Dirbuster web directory scanner Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dirbuster%20tutorial.php
Nmap port scanner:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Legion port scanner and vulnerability scanning tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/legion%20tutorial.php
hping3 packet crafting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/hping3%20tutorial.php
amap scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/amap%20tutorial.php
masscan fast port scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/masscan%20tutorial.php
netcat tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/netcat%20tutorial.php
VULNERABILITY SCANNING TUTORIALS
Nessus tenable tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nessus%20tenable%20essentials%20tutorial.php
Nikto tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Exploit tools:
Metasploit beginner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/metasploit%20tutorial.php
SQL Map tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sqlmap%20tutorial.php
routersploit tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/routersploit.php
FORENSIC INVESTIGATION TOOLS:
Wireshark Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/wireshark%20tutorial.php
LastActivityView tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/lastActivityView%20tutorial.php
Process Monitor Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/Process%20Monitor%20Tutorial.php
Autoruns Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/autoruns%20tutorial.php
More Game Development, Cyber Security, Linux and Coding tutorials on my website
https://sweshi.com
-
16:48
itsSeanDaniel
16 hours agoGenius Republican Defends Charlie Kirk and CALLS OUT The Radical Left
2641 -
9:09
Freedom Frontline
15 hours agoFox News Just Showed The Video Biden Never Wanted Seen
4.13K13 -
0:27
historyofboxing
17 hours ago $0.13 earnedThe Cuban Machine… and Deadliest KO Phenom Right Now – David Morrell Jr
1.48K -
38:07
Degenerate Plays
14 hours ago $0.24 earnedWorst Star Wars Character Pranks Us All - Call of Duty: Modern Warfare 3 (2011) : Part 3
3.66K -
LIVE
BEK TV
2 days agoTrent Loos in the Morning - 9/15/2025
163 watching -
3:38:49
Badlands Media
1 day agoThe Narrative Ep. 38: The Sovereign World
118K62 -
2:57:44
The Charlie Kirk Show
14 hours agoWASHINGTON D.C. PRAYER VIGIL FOR CHARLIE KIRK
266K455 -
14:11
Robbi On The Record
15 hours agoThe Trap of Identity Politics: How Division is Killing America
32.8K56 -
1:29:23
Nerdrotic
14 hours ago $22.10 earnedThe Turning Point | New UFO Video with Michael Collins | Forbidden Frontier #117
95.9K30 -
1:08:26
Sarah Westall
12 hours agoSuicide Pacts forming in Youth Social Media Groups - Discord, Reddit, TikTok w/ John Anthony
89.1K29