Giter Site home page Giter Site logo

revoltsecurities / subdominator Goto Github PK

View Code? Open in Web Editor NEW
234.0 3.0 37.0 312 KB

SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty

License: MIT License

Python 100.00%
bugbounty information-gathering reconnaissance subdomain-enumeration subdomains subdomains-discovery python subdomain-finder subdomains-enumeration subdomain-gathering

subdominator's Introduction

Subdominator - Unleash the Power of Subdomain Enumeration

Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential security vulnerabilities by efficiently enumerating subdomains some various free passive resources.

GitHub last commit GitHub release (latest by date) GitHub license LinkedIn

Features:


  • fast and powerfull to enumerate subdomains.
  • 35+ passive results to enumerate subdomains.
  • configurable API keys setup
  • Integrated notification system

Usage:

subdominator -h
                    __         __                       _                    __                
   _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____
  / ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/
 (__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    
/____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     
                                                                                               

                     @RevoltSecurities


          
[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources

[USAGE]: 

    subdominator [flags]
    
[FLAGS]: 

    [INPUT]: 
    
        -d,   --domain                  :  domain name to enumerate subdomains.
        -dL,  --domain-list             :  filename that contains domains for subdomain enumeration.
        stdout                          :  subdominator supports stdout to pipe its output
        
    [OUTPUT]: 
    
        -o,   --output                  :  filename to save the outputs.
        -oD,  --output-directory        :  directory name to save the outputs (use it when -dL is flag used).
        
    [OPTIMIZATION]: 
    
        -t,   --timeout                 : timeout value for every sources requests. 
    
    [Update]: 
    
        -up,   --update                 :  update subdominator for latest version but yaml source update required manual to not affect your api keys configurations.
        -duc, --disable-update-check    :  disable automatic update check for subdominator
        -sup, --show-updates            :  shows latest version updates of subdominator 
        
    [CONFIG]: 
    
        -nt,  --notify              :  send notification of found subdomain using source Slack, Pushbullet, Telegram, Discord
        -p,   --proxy               :  http proxy to use with subdominator (intended for debugging the performance of subdominator).
        -cp,  --config-path         :  custom path of config file for subdominator to read api keys ( default path: /home/sanjai/.config/Subdominator/provider-config.yaml)
        
    [DEBUG]: 
    
        -h,   --help                :  displays this help message and exits 
        -v,   --version             :  show current version of subdominator and latest version if available and exits
        -ske, --show-key-error      :  show keys error for out of credits and key not provided for particular sources
        -sre, --show-timeout-error  :  show timeout error for sources that are timeout to connect
        -nc,  --no-color            :  disable the colorised output of subdominator
        -ls,  --list-source         :  display the sources of subdominator uses for subdomain enumerations and exits (included for upcoming updates on sources).

Subdominator Integrations:

Subdominator integrates with various free API passive sources to gather valuable subdomain information. We would like to give credit to the following websites for providing free-to-obtain API keys for subdomain enumeration. Claim your free API keys here: Subdomains Resources:

Notification Resources:

Installation:

**Subdominator requires python latest version to be installed and with latest version pip commandline tool

pip install git+https://github.com/RevoltSecurities/Subdominator

Post Installation setup:

subdominator can be used after installing successfully but if you want to use subdominator efficiently with its maximum level then some source requires API keys to setup and users can use this command:

subdominator -ls
                    __         __                       _                    __                
   _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____
  / ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/
 (__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    
/____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     
                                                                                               

                     @RevoltSecurities

[Version]: Subdominator current version v1.0.7 (latest)
[INFO]: Current Available free passive resources: [39]
[INFO]: Sources marked with an * needs API key(s) or token(s) configuration to works
[INFO]: Hey sanjai you can config your api keys or token here /home/sanjai/.config/Subdominator/provider-config.yaml to work
abuseipDB                                                                                                                                                                                                                                     
alienvault                                                                                                                                                                                                                                    
anubis                                                                                                                                                                                                                                        
bevigil*                                                                                                                                                                                                                                      
binaryedge*                                                                                                                                                                                                                                   
bufferover*                                                                                                                                                                                                                                   
censys*                                                                                                                                                                                                                                       
certspotter*                                                                                                                                                                                                                                  
chaos*                                                                                                                                                                                                                                        
columbusapi                                                                                                                                                                                                                                   
crtsh                                                                                                                                                                                                                                         
digitorus                                                                                                                                                                                                                                     
dnsdumpster*                                                                                                                                                                                                                                  
dnsrepo                                                                                                                                                                                                                                       
facebook*                                                                                                                                                                                                                                     
fullhunt*                                                                                                                                                                                                                                     
google*                                                                                                                                                                                                                                       
hackertarget                                                                                                                                                                                                                                  
huntermap*                                                                                                                                                                                                                                    
intelx*                                                                                                                                                                                                                                       
leakix*                                                                                                                                                                                                                                       
netlas*                                                                                                                                                                                                                                       
quake*                                                                                                                                                                                                                                        
rapidapi*                                                                                                                                                                                                                                     
rapiddns                                                                                                                                                                                                                                      
redhuntlabs*                                                                                                                                                                                                                                  
securitytrails*                                                                                                                                                                                                                               
shodan*                                                                                                                                                                                                                                       
shodanx                                                                                                                                                                                                                                       
shrewdeye                                                                                                                                                                                                                                     
sitedossier                                                                                                                                                                                                                                   
subdomaincenter                                                                                                                                                                                                                               
urlscan                                                                                                                                                                                                                                       
virustotal*                                                                                                                                                                                                                                   
waybackarchive                                                                                                                                                                                                                                
whoisxml*                                                                                                                                                                                                                                     
zoomeyeapi*                                                                                                                                                                                                                                   
rapidfinder*: Rapidfinder requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/Glavier/api/subdomain-finder3/pricing                                                              
rapidscan*  : Rapidscan requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/sedrakpc/api/subdomain-scan1/pricing       

here above we can see subdominator resources it uses and resource marked with an (*) need API keys to work and users can collect API keys from those websites and hyperlink will provided for sources when using command subdominator -ls every source link provided as a hyperlink so place your cursor on sources will show the hyperlink on your terminal

Keys configurations:

so we saw what are the resources are available for subdominator so now where to paste keys? it easy just see in your ~/$HOME/.config/Subdominator/provider-config.yaml and all sourcess are available there, now paste your API keys and One more thing Subdominator follow same keys setup syntax of subfinder and you refer https://docs.projectdiscovery.io/tools/subfinder/install#post-install-configuration but before refering there is only one difference is for zoomeyeapi in subdominator which in subfinder you need to give both host and key ex:

zoomeyeapi:
   - zoomeye.hk:AudbAfjHslif_sudf

but in subdominator you should give only api keys not host for ex:

zooeyeapi:
   - AudbAfjHslif_sudf

Now lets come to other resources setup that varies from subfinder:

  • Dnsdumpter Setup:

    *Dnsdumpster requires csrf token and cookie to obtain it visit Dnsdumpter: Dnsdumpster Search any domain and Intercept the requests your burp that contains token and cookie. Copy that and paste in your yaml file


  • Google Setup:

    • Step 1: First login a google account in your browser
    • Step 2: Visit here and create a search engine and choose all web option like below mentioned in images


    - Step 3: After Creating your successfull search engine it time to copy your cx id - Step 4: After completing these all process now its time to grab your api keys of google [here](https://developers.google.com/custom-search/v1/introduction) - Step 5: Press the get key button and create a new project with any name you want and click next - Step 6: After creating and completing your api key is generated and press show key then copy it - Step 7: Now its time to paste your google cx id and API key in yaml file
google
  #cxID:Apikey
  - 23892479:AIdjhakbkdiudgiao

So you configured this different resources of subdominator, now follow the other steps to setting up API keys which I mentioned before here https://github.com/RevoltSecurities/Subdominator/edit/main/README.md#keys-configurations Now After setting up your api keys your provider yaml file looks like

censys: 
  - 9f5a-be11-4b9e-9564-9596e78:Va92kyMYPS7ANKpI8CjV

facebook:
  - 1550699734936481:3b2eff7304659559380ad88d8c4b82f

google:
   - 34992b4aee9494e7b:AIzaSyCcEqqOERofbkudEY_iVC2_Wfv0A

intelx:
  - 2.intelx.io:1995e804-3c71-4938042-8042802-efa29ae2964d

zoomeyeapi:
   - 3833802-b9FF-6E1A5-7d2d-9792d64082adf
   - 6F28942CC-ACA5-573E8-d769-99b4c728042d

redhuntlabs: 
  - https://reconapi.redhuntlabs.com/community/v1/domains/subdomains:VRp7HK3jWiRSnpPfois7979spn4tvDVi0vM

dnsdumpster:
  - zsdqYb0rvIVYh2uPHo5Yk4EljV9GEKn44hDL9V2DFXznflW37Q5pZl8pvQHUHWav:Z488EzyPXVwDAhDGlm8gTBvkubRfLyBxuTytPjA17aa2yA5ULO8HySZoG6ptOKoY

Booyah ⚡ completed , now you can run subdominator with its maxiumum and wait for 2-4 minutes then you will have your results.

Security:

Subdominator is a promising tool that will never cause any threats to users or security researcher and its safe to use. Even without Users permissions subdominator will not update itself and I welcome everyone who are intrested contribute for Subdominator can create their issues and report it.

License:

Subdominator is built by RevoltSecurities Team with ❤️ and your support will encourage us to improve the subdominator more and Community contributors are Welcome to contribute for subdominator and If you love the subdominator support it by giving a ⭐ .

subdominator's People

Contributors

revoltsecurities avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

subdominator's Issues

Could not find a version that satisfies the requirement yaml

╭─hritom@0xm4lw4r3 in repo: Subdominator/subdominator on  main [!?] via  v3.11.6 took 1s
[🔴] × python3 -m pip install yaml --break-system-packages
Defaulting to user installation because normal site-packages is not writeable
ERROR: Could not find a version that satisfies the requirement yaml (from versions: none)
ERROR: No matching distribution found for yaml

please help me to resolve this error. I am using garuda linux which is based on arch linux.

need `-s/--silent` argument

thanks for this script. now just could you make -s/--silent argument for hide all banner and script default text. only shows output.

False Positive Result

This tool showing too many false positive result. I scanned vulnweb.com site. tool gives me 5000+ result. Can you please reduce the false positives?

Bash Pipe command not working,

When I try to automate with this tool, it's not working.
It's says "No module named 'pygments'", but I already installed this module. check photo
uuuuuuuu

check my automation with your tool
yyyyyyyyyyyyyy

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.