
TheHarvester is a powerful OSINT tool used to gather emails, subdomains, usernames, and more from public sources. Ideal for ethical hackers, bug bounty hunters, and red teamers, this cheatsheet provides all essential commands, modules, and use cases to quickly extract intel from various sources like Google, Shodan, and LinkedIn.
TheHarvester Cheatsheet
The Ultimate OSINT Gathering Tool Reference Guide
Basic TheHarvester Usage
theHarvester -d example.com -l 500 -b all
theHarvester -h
theHarvester -v
theHarvester -d example.com -b google
theHarvester -d example.com -l 200 -b bing
theHarvester -d example.com,example2.com -b all
Data Source Options
theHarvester -d example.com -b all
theHarvester -d example.com -b google
theHarvester -d example.com -b bing
theHarvester -d example.com -b yahoo
theHarvester -d example.com -b baidu
theHarvester -d example.com -b dnsdumpster
theHarvester -d example.com -b linkedin
theHarvester -d example.com -b twitter
theHarvester -d example.com -b pgp
theHarvester -d example.com -b threatcrowd
theHarvester -d example.com -b censys
theHarvester -d example.com -b crtsh
theHarvester -d example.com -b securitytrails
theHarvester -d example.com -b netcraft
theHarvester -d example.com -b virustotal
theHarvester -d example.com -b shodan
Advanced TheHarvester Options
theHarvester -d example.com -b google --proxy 127.0.0.1:8080
theHarvester -d example.com -b all --take-screenshot
theHarvester -d example.com -b all --dns-brute
theHarvester -d example.com --dns-brute --dns-limit 100
theHarvester -d example.com -b all --dns-server 8.8.8.8
theHarvester -d example.com -b all -f results.html
theHarvester -d example.com -b all -j results.json
theHarvester -d example.com -b all -x results.xml
theHarvester -d example.com -b all -c results.csv
theHarvester -d example.com -b shodan --shodan-filters "port:22"
theHarvester -d example.com -b google --google-cse-id YOUR_CSE_ID
theHarvester -d example.com -b google --google-api-key YOUR_API_KEY
theHarvester -d example.com -b linkedin --linkedin-api-key YOUR_API_KEY
theHarvester -d example.com -b twitter --twitter-consumer-key KEY --twitter-consumer-secret SECRET --twitter-access-token TOKEN --twitter-access-token-secret TOKEN_SECRET
theHarvester -d example.com -b virustotal --virustotal-api-key YOUR_API_KEY
theHarvester -d example.com -b shodan --shodan-api-key YOUR_API_KEY
theHarvester -d example.com -b securitytrails --securitytrails-api-key YOUR_API_KEY
Practical Examples
theHarvester -d example.com -l 500 -b google,bing,dnsdumpster -f report.html
theHarvester -d example.com -b all --dns-brute --take-screenshot -j results.json
theHarvester -d example.com -b google,bing,pgp -l 1000
theHarvester -d example.com -b dnsdumpster,threatcrowd,crtsh --dns-brute --dns-limit 200
theHarvester -d example.com -b linkedin --linkedin-api-key YOUR_API_KEY
theHarvester -d example.com -b shodan --shodan-api-key YOUR_API_KEY --shodan-filters "port:80,443"
theHarvester -d example.com -b securitytrails --securitytrails-api-key YOUR_API_KEY
theHarvester -d example.com -b censys --censys-api-id YOUR_API_ID --censys-api-secret YOUR_API_SECRET
theHarvester -d example.com -b twitter --twitter-consumer-key KEY --twitter-consumer-secret SECRET --twitter-access-token TOKEN --twitter-access-token-secret TOKEN_SECRET
Discover more from Cyber Samir
Subscribe to get the latest posts sent to your email.