Coder Social home page Coder Social logo

hashtag-amin / hashtag-recon Goto Github PK

View Code? Open in Web Editor NEW
9.0 1.0 0.0 1.96 MB

Reconnaissance & Footprinting framework for BugHunters & RedTeamers

License: MIT License

Shell 60.39% Python 39.61%
automation bash bash-script bugbounty bughunting python3 recon reconnaissance redteam redteam-tools

hashtag-recon's Introduction

ย  ๐Ÿ”ญ Hashtag-Recon

Reconnaissance & Footprinting framework for BugHunters & RedTeamers

ย ย ย ย 

This tool can handle almost all recon steps and have these Modules:

โ””โ”€# ./hashtag-Recon

           _     _          _                            ______
          (_)   (_)        | |     _                    (_____ \
          ______ _____  ___| |__ _| |_ _____  ____ _____ _____) )_____  ____ ___  ____
         | ___  (____ |/___|  _ (_   _(____ |/ _  (_____|  __  /| ___ |/ ___/ _ \|  _ \
        | |   | / ___ |___ | | | || |_/ ___ ( (_| |     | |  \ \| ____( (__| |_| | | | |
        |_|   |_\_____(___/|_| |_| \__\_____|\___ |     |_|   |_|_____)\____\___/|_| |_|
                                            (_____|
                                                                Hashtag_AMIN
                                                        https://github.com/hashtag-amin

        External:
            subdomain, Resolver, ptResolver, dnsBrute
            dnsLooter, openSSL, whois, favicon, portScan
            vhostScan, apkExtract, liveProbe, screenShoter
            
        Internal:
            crawler, JSEnum, techDetect, roboMap
            paramExtract, hiddenParam, hiddenHeader

        Custom:
            Fuzzer, Tamper, Extractor, Spliter


Use these tools in this Framework:

At First:

Need to install

Python
Golang

# better lastest version

Need Github Subdomain token (optional But use in some module)

export $GITHUB_TOKEN="Your_Github_Token"

After Need export Golang Path or Copy in $PATH folders:

export GOPATH=$HOME/go
export PATH="$PATH:$GOPATH/bin"

Or

cp /root/go/bin/* /usr/local/sbin/ || cp /home/${USER}/go/bin/* /usr/local/sbin/

Common tools:

ย ย ย ย  nmap, jq, dos2unix, curl, wget, git, whois, whatweb, wafw00f, apktool

External tools:

ย ย ย ย  Subfinder, ย  Sublist3r, ย  assetfinder, ย waybackurls, ย  github-subdomains, ย  shuffledns, ย  dnsx, ย  cut-cdn, ย  massdns, ย  ffuf, ย  httpx

Internal tools:

ย ย ย ย  gauplus, ย  getJS, ย  katana, ย  gospider, ย  unfurl, ย  fetchParam, ย  RoboFinder, ย  trufflehog, ย  wad, ย  wappalyzer-cli, ย  arjun, ย  x8

Also you can install all tools with Tools-Install.sh script

bash ./Tools-Install.sh

Wordlist

a little and useful Wordlist in ./wordlist collect from SecList & Bugbounty wordlist & assetnote

Also has script that update wordlist with dynamic assetnote wordlist

bash ./wordlist-Updater.sh

Finally need Headless Browser for get a better result, But is optional (Ubuntu & Debian base)

wget -q -O - https://dl-ssl.google.com/linux/linux_signing_key.pub | sudo apt-key add - 
sudo sh -c 'echo "deb http://dl.google.com/linux/chrome/deb/ stable main" >> /etc/apt/sources.list.d/google.list'
sudo apt update 
sudo apt install google-chrome-stable

Test and run on Ubuntu & Kali

Also all modules run in wsl (Windows) too, Expect Headless Browser

Let's autopsy Modules and how to use

External

Subdomain

This module has two mode:

Light
    - fast mode and Not use all resource such as:
        Subfinder, Subli3tr, assetfinder, jldc.me, Content-Security-Policy Header
Heavy
    - Slow mode but has a good & deep result of subdomains list
        use all tools in fast mode , aditonal with deep flag in each tools
        So use github-subdomain, waybackurls(Archive), amass -whois (Reverse Whois Mode)
Recursive
    - take subdomains list in Last two mode and search subdomains recursively.
        Better use resolver module then use this.

In one lier deep this module use Providers & Project websits, certificate, seaarch Engines, whois, Reverse whois & ...


    ./hashtag-Recon subdomain -light -domain example.com
    ./hashtag-Recon subdomain -heavy -domain example.com
    ./hashtag-Recon subdomain -recursive -subs example.com.subs.txt

Output:
    example.com.Subs-provider.txt
    example.com.recursive-Subs.txt

Resolver

Take list of subdomains and resolve all domains that has any dns record

    ./hashtag-Recon resolver -subs example.com.subs.txt

Output:
    example.com.Subs.resolve.txt

Use massdns and wrapper on that shuffledns

PtResolver

Take list of CIDRs/IPs and resolve all IPs that has ptr dns record

    ./hashtag-Recon ptresolver -ip example.com.CIDR.txt

Output:
    example.com.ptresolver.txt

Use dnsx in this part

DnsBrute

This module has two mode looklike subdomain module:

Light
    - fast mode and use top 500k subdomain & efficient wordlist for dnsgen
        
Heavy
    - Slow mode but Use top 1M subdomain & complete wordlist for dnsgen
        
Use shuffledns & dnsgen with Custom wordlist that take & collect from almost all similar tools
First FUZZ.domain.tld
Then Resolve dnsgen result

    ./hashtag-Recon dnsBrute -domain example.com -subs example.com.subs.txt -light
    ./hashtag-Recon dnsBrute -domain example.com -subs example.com.subs.txt -heavy

Output:
    example.com.dnsBrute.txt
    example.com.dnsgen.txt
    example.com.dnsBrute-gen.txt

DnsLooter

Again use dns protocol but this time, loot time :)

Extract dns record such as : A, CNAME, MX, PTR

Then Exclude CDN IPs, Find CIDR range

    ./hashtag-Recon dnsLooter -subs example.com.subs.txt

Output:
    example.com.Subs.ip-A.txt
    example.com.Subs.mx.txt
    example.com.Subs.cname.txt
    example.com.Subs.No-cdn.txt
    example.com.Subs.CIDR.txt
    example.com.Subs.ptr.txt

Use dnsx, cut-cdn & bgpview.io api

OpenSSL

Make TLS/SSL connection with domain & take more details

    ./hashtag-Recon dnsBrute -domain example.com -port 443

Use openssl command in BASH

Whois

In this module Extract CIDR, Organization, Email, Inet & ... And make Output cleaner & useful

    ./hashtag-Recon whois -subs example.com.subs.txt

Output:
    example.com.Subs.whois.txt

Use whois dig grep & a little creation in BASH

Favicon

Extract favicon of subdomain for search in Search Engines

    ./hashtag-Recon favicon -subs example.com.subs.txt

Output:
    example.com.favicon.txt

Use httpx & check simple live domains too

PortScan

In this module use Legend Nmap in 4 modes:

- ssl-light
    Scan top ports use ssl 
- ssl-heavy
    Scan known ports use ssl
- http
    Scan known ports use http
- top
    Scan 1000 top ports with --top-ports 1000 Nmap flag

    ./hashtag-Recon portscan -hosts example.com.CIDR.txt -domain example.com -ssl-heavy
    ./hashtag-Recon portscan -hosts example.com.ip.txt -domain example.com -ssl-light
    ./hashtag-Recon portscan -hosts example.com.resolve.txt -http
    ./hashtag-Recon portscan -hosts example.com.CIDR.txt -top

Output:
    example.com-ssl-cert.all-domains.txt
    example.com-ssl-cert-domain.txt
    example.com-PortScan-http.txt
    example.com-PortScan-1000.txt

Also use /usr/share/nmap/nmap-services file for extract port number

Some onliner for extract port numer

For extract ports that use SSL/TLS

sort -r -k3 /usr/share/nmap/nmap-services | tr "\t" " " | cut -d " " -f1-2 |  grep -E "(ssl|tls|https)" | grep -Eo "([0-9]*/tcp|[0-9]*/udp)" | cut -d / -f1 | sort -un | tr "\n" "," | sed "s/\,$//"

For extract ports that use http/https

sort -r -k3 /usr/share/nmap/nmap-services | tr "\t" " " | cut -d " " -f1-2 |  grep -E "(https|http)" | grep -Eo "([0-9]*/tcp|[0-9]*/udp)" | cut -d / -f1 | sort -un | tr "\n" "," | sed "s/\,$//"

vhostScan

Scan vitual host & fuzz in Host header in 3 mode:

- Host: FUZZ
    Fuzz with custom wordlist ./wordlist/fuzz-vhost.txt

- Host: FUZZ.domain.tld
    Fuzz wtih custom wordlist than concatinate main domain

- Host: subs.domain.tld
    Fuzz with subdomain list that given

    ./hashtag-Recon vhostScan -url http://1.1.1.1 -domain example.com -subs example.com.subs.txt

Output:
    example.com.vhostScan.csv

Use ffuf & custom wordlist in this module

ApkExtract

Extract endpoint from Android file [.apk] when decomplie that

    ./hashtag-Recon apkExtract -app example.apk

Output:
    example.com.apk-Endpoint.txt

Use apktools then grep command

Url Extract with on command !!

grep -IPhro "(https?://|http?://)[\w\.-/]+[\"'\`]"

LiveProbe

This modules Probe http ports in two mode

- Light
    Scan top ports use http
- heavy
    Scan known ports use http

    ./hashtag-Recon liveProbe -subs example.com.subs.txt -light
    ./hashtag-Recon liveProbe -subs example.com.subs.txt -heavy

Output:
    example.com-httpx/
    example.com-live-httpx.txt

Use amazing httpx and store raw response for other checks

ScreenShoter

Take screenShot from live domain for check functionality

    ./hashtag-Recon screenShoter -urls example.com.live.txt

Output:
    example.com-shots/

Also use httpx & if you don't install headless browser, httpx try to install that

Internal

Crawler

Crawl Live ulrs that earn in last modules & has two mode

- Light
    Fast crawl without headless browser
    Use katana, gospider, waybackurls

- headless
    Deep crawl use headless browser
    Use light mode tools & katana with headless browser, aditional gauplus


    ./hashtag-Recon crawler -domain example.com -urls example.com.live.txt -headless
    ./hashtag-Recon crawler -domain example.com -urls example.com.live.txt -light

Output:
    example.com.live.crawl.txt

JSEnum

This moment, time for JS file & has 3 mode

- content
    Get JS urls then try to get content & hash MD5 for track changes

- secret
    - url
        take github repo url then try to find sensetive data
        Need to set $GITHUB_TOKEN
    - dir
        take a directory that get in -content mode

- endpoint
    Extract endpoints in JS files 

    ./hashtag-Recon jsEnum -content -urls example.com.live.txt
    ./hashtag-Recon jsEnum -secret -url http://github.com/example.git
    ./hashtag-Recon jsEnum -secret -dir example.com-JS-content-dir
    ./hashtag-Recon jsEnum -endpoint -dir example.com-JS-content-dir

Output:
    example.com-JS-content--[date].txt
    example.com-JS-md5sum--[date].txt
    example.com-JS-SecretFinder.txt
    example.com-JS-endpoints.txt

Use getJs, trufflehog, wget, grep, xargs & md5sum tools & commands in this module

Techdetect

Detect technology that use in domain name

    ./hashtag-Recon techDetect -domain example.com

Output:
    example.com.techdetect.txt

Use wappy, whatweb, wad & wafw00f

RoboMap

In this module use archive for find old sitemap.xml & robots.txt then try active and send request to url

    ./hashtag-Recon robomap -urls example.com.live.txt

Output:
    example.com-robomap.txt

Use robofinder, curl and a little BASH

Paramextract

Extract parameters use in app & make custom wordlist, also extract all path

    ./hashtag-Recon paramextract -urls example.com.crawl.txt
Output:
    example.com-param-wordlist.txt
    example.com-paths.txt

Use fetchParam(my first tool), unfurl

HiddenParam

This module has 2 mode

- Light
    Fuzz parameter in url that given with custom wordlist & http method

- Heavy
    Fuzz parameter in url with with top 20000 parameter & custom wordlist with GET & POST method

    ./hashtag-Recon hiddenParam -url "http://example.com[/param?key=value]"
                                -wordlist example.com.param-wordlist.txt
                                -light -method POST

    ./hashtag-Recon hiddenParam -url "http://example.com[/param?key=value]"
                                -wordlist example.com.param-wordlist.txt
                                -heavy
Output:
    example.com-hparam-get.txt
    example.com-hparam-post.txt

Use x8 & arjun and assetnote parameter wordlist

HiddenHeader

Explain more about 2 mode

- Light
    Fuzz header that given with custom wordlist & http method

- Heavy
    Fuzz header with wordlists that include upper & mixcase case header with GET & POST method

    ./hashtag-Recon hiddenHeader -url http://example.com -heavy
    ./hashtag-Recon hiddenHeader -url http://example.com -light
                                 -wordlist header-wordlist.txt
                                 -method POST
Output:
    example.com-hheader-get.txt
    example.com-hheader-post.txt

Use x8 & Bugbounty parameter wordlist

Custom

Fuzzer

Fuzzer has 3 mode:

- dir
    Fuzz url with sensetive directories in http://target.tld/FUZZ

- file
    Fuzz url with sensetive files in http://target.tld/SOME-PATH/FUZZ

- wordlist
    Fuzz url with Custom wordlist & need to declare FUZZ keyword in url

    ./hashtag-Recon fuzzer -url http://example.com -dir
    ./hashtag-Recon fuzzer -url http://example.com -file
    ./hashtag-Recon fuzzer -url http://example.com/FUZZ
                           -wordlist ./Custom-wordlist.txt
Output:
    example.com-fuzz.csv
    example.com-fuzz-dir.csv
    example.com-fuzz-file.csv

Use ffuf & bugbounty & assetnote wordlist

Tamper

Tamper url with http methods in two mode

- Light
    Use top http methods

- Heavy
    Use known & almost all http methods


    ./hashtag-Recon Tamper -url http://example.com -light
    ./hashtag-Recon Tamper -url http://example.com -heavy

Output:
    example.com-tamper.txt


Just use curl & a little BASH

Extractor

In this module, Extract outputs from other modules, such as:

- LiveProbe
    Extract result of liveprobe module with http Status code

- Vhost
    Extract result of vhostScan module with http Status code & Parameter that FUZZ

- crawl
    Extract result of Crawler module with Extention & has Parameter

- Fuzz
    Extract result of Fuzzer module with http Status code
        
- ip 
    Extract all IPs in files or directories

- diff
    Check diffrence between that subdomain Just earnd by dnsBrute module and Not in Providers

    ./hashtag-Recon Extractor -liveprobe -input example.com.*
    ./hashtag-Recon Extractor -vhost -input *.vhostScan.csv
    ./hashtag-Recon Extractor -crawl -input example.com/*.txt
    ./hashtag-Recon Extractor -fuzz -input example.com.fuzz.csv
    ./hashtag-Recon Extractor -ip -input example.com.fuzz.txt
    ./hashtag-Recon Extractor -diff -provider example.com.subs.txt -dns example.com.live.txt
Output:
    example.com.live.20X.txt
    example.com.vhostScan.4XX.txt
    example.com.crawl.hasParam.txt
    example.com.crawl.php.txt

Use grep in this module
And remember input can give wildcard too.

Let's Stir up emotions about grep & RegEx

#Extract with status code

grep -rhE "(20[0-8]{1})"                      # 20X
grep -rhE "(30[0-8]{1})"                      # 30X
grep -rhE "(4[0-2]{1}[0-9]{1})"               # 4XX 
grep -rhE "(5[0-1]{1}[0-9]{1})"               # 5XX

# Extract Crawler

grep -rhE "(\w+\.aspx(\?|$)|\w+\.asp(\?|$))"  # asp|aspx
grep -rhE "\w+\.php(\?|$)" >                  # php
grep -rhE "\w+\.js(\?|$)" >                   # js
grep -rhE "\w+\.jsp(\?|$)" >                  # jsp
grep ? | sort -u >                            # hashParam
grep -v ? | sort -u >                         # noParam.txt

Spliter

Split result of module when have huge result and need to split by:

- Line
    Split file to files that contains n Lines in each file

- File
    Split file to n files

- Size
    Split file to files that has n size

./hashtag-Recon Spliter -input example.com.subs.txt -line 30
./hashtag-Recon Spliter -input example.com.crawl.txt -file 5
./hashtag-Recon Spliter -input example.com.crawl.txt -size 2M

Output:
    example.com.crawlXX.txt ==> [XX:01-99]

Just use split command in BASH

Let see Structure

You can Customize these script

And have better ideas to handle these, But educational purpose is included :)

โ”œโ”€โ”€ hashtag-Recon
โ”œโ”€โ”€ modules
โ”‚ย ย  โ”œโ”€โ”€ Custom
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-extractor-crwal.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-extractor-diffrence.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-extractor-fuzz.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-extractor-httpx.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-extractor-ip.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-extractor-vhost.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-fuzz-custom.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-fuzz-dir.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-fuzz-file.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-spliter-file.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-spliter-line.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-spliter-size.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-verb-tamper-heavy.sh
โ”‚ย ย  โ”‚ย ย  โ””โ”€โ”€ Recon-verb-tamper-light.sh
โ”‚ย ย  โ”œโ”€โ”€ External
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-apk-extract.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-dns-Brute-heavy.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-dns-Brute-light.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-DNS-CIDR.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-favicon.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-openssl-cert.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-ORG-CIDR.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-PortScan-http.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-PortScan-ssl-cert-heavy.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-PortScan-ssl-cert-light.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-PortScan-top-1000.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-ptResolver.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-Resolver.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-subdomain-heavy.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-subdomain-light.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-subdomain-recursive.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-to-I-live-domains-heavy.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-to-I-live-domains-light.sh
โ”‚ย ย  โ”‚ย ย  โ”œโ”€โ”€ Recon-E-to-I-screen-shoter.sh
โ”‚ย ย  โ”‚ย ย  โ””โ”€โ”€ Recon-E-vhost-Brute.sh
โ”‚ย ย  โ””โ”€โ”€ Internal
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-crawl-headless.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-crawl-light.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-extract-param-path.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-hidden-header-heavy.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-hidden-header-light.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-hidden-Param-heavy.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-hidden-Param-light.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-JS-enum-get-content.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-JS-enum-get-endpoint.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-JS-enum-get-secret-file.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-JS-enum-get-secret-github.sh
โ”‚ย ย      โ”œโ”€โ”€ Recon-I-robots-sitemap.sh
โ”‚ย ย      โ””โ”€โ”€ Recon-I-tech-detect.sh

And wordlist directoy:

โ”œโ”€โ”€ wordlist
โ”‚ย ย  โ”œโ”€โ”€ arjun-param-special.json
โ”‚ย ย  โ”œโ”€โ”€ dns-dnsgen-wordlist-heavy.txt
โ”‚ย ย  โ”œโ”€โ”€ dns-dnsgen-wordlist-light.txt
โ”‚ย ย  โ”œโ”€โ”€ dns-resolvers.txt
โ”‚ย ย  โ”œโ”€โ”€ dns-wordlist-heavy.txt
โ”‚ย ย  โ”œโ”€โ”€ dns-wordlist-light.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-cgi-files.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-config.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-dir-api-info.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-dir-backup_files.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-dir-cve.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-dir-leaky-misconfigs.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-dotfiles.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-env.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-keys.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-logs.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-npmrc.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-sensetive-files.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-sql.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-vhost.txt
โ”‚ย ย  โ”œโ”€โ”€ fuzz-yaml.txt
โ”‚ย ย  โ”œโ”€โ”€ passwords.txt
โ”‚ย ย  โ”œโ”€โ”€ usernames.txt
โ”‚ย ย  โ”œโ”€โ”€ x8-header-lowercase.txt
โ”‚ย ย  โ”œโ”€โ”€ x8-header-uppercase.txt
โ”‚ย ย  โ”œโ”€โ”€ x8-param-all.txt
โ”‚ย ย  โ””โ”€โ”€ x8-param-mixescase-large.txt
โ””โ”€โ”€ wordlist-Updater.sh

Finally special thanks

My dear & lovely Professor Mr JADI

learned & learning valuable things from you both in life and on the Python & Linux

Thansk a lot, learn many thing from both of you ๐ŸŒฑ

My handsome Professor Borna

And My Cute Professor yashar

And my friend Mohamad Reza help me in this project


Happy Learning :)

Happy Hunting

hashtag-recon's People

Contributors

hashtag-amin avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.