Subdominator - An ultimate subdomain enumeration tool for Security Researchers and Bug Bounty Hunters
Project description
Subdominator - Unleash the Power of Subdomain Enumeration
Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential security vulnerabilities by efficiently enumerating subdomains some various free passive resources.
Features:
- fast and powerfull to enumerate subdomains.
- 50+ passive results to enumerate subdomains.
- configurable API keys setup
- Integrated notification system
Info:
We request existing user to update their config yaml file with new resources by opening the config file in : bash $HOME/.config/Subdominator/provider-config.yaml
and add the below resources:
builwith:
- your-api-key1
- your-api-key2
passivetotal:
- user-mail1:api-key1
- user-mail2:api-key2
trickest:
- your-api-key1
- your-api-key2
by these your config yaml file will get updated or else check your yaml file that matches the below mentioned resources with *, The new users will required to update in next version if any new resources added in Subdominator.
Usage:
subdominator -h
| | _) |
__| | | __ \ _` | _ \ __ `__ \ | __ \ _` | __| _ \ __|
\__ \ | | | | ( | ( | | | | | | | ( | | ( | |
____/ \__,_| _.__/ \__,_| \___/ _| _| _| _| _| _| \__,_| \__| \___/ _|
@RevoltSecurities
[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources
[USAGE]:
subdominator [flags]
[FLAGS]:
[INPUT]:
-d, --domain : domain name to enumerate subdomains.
-dL, --domain-list : filename that contains domains for subdomain enumeration.
stdin/stdout : subdominator now supports stdin/stdout
[OUTPUT]:
-o, --output : filename to save the outputs.
-oD, --output-directory : directory name to save the outputs (use it when -dL is flag used).
-oJ, --output-json : filename to save output in json fromat
[OPTIMIZATION]:
-t, --timeout : timeout value for every sources requests.
[UPDATE]:
-up, --update : update subdominator for latest version but yaml source update required manual to not affect your api keys configurations.
-duc, --disable-update-check : disable automatic update check for subdominator
-sup, --show-updates : shows latest version updates of subdominator
[CONFIG]:
-nt, --notify : send notification of found subdomain using source Slack, Pushbullet, Telegram, Discord
-p, --proxy : http proxy to use with subdominator (intended for debugging the performance of subdominator).
-cp, --config-path : custom path of config file for subdominator to read api keys ( default path: /home/sanjai/.config/Subdominator/provider-config.yaml)
-fw, --filter-wildcards : filter the found subdomains with wildcards and give cleaned output
[DEBUG]:
-h, --help : displays this help message and exits
-s, --silent : show only subdomain in output (this is not included for -ski,-sti)
-v, --version : show current version of subdominator and latest version if available and exits
-ski, --show-key-info : show keys error for out of credits and key not provided for particular sources
-ste, --show-timeout-info : show timeout error for sources that are timeout to connect
-nc, --no-color : disable the colorised output of subdominator
-ls, --list-source : display the sources of subdominator uses for subdomain enumerations and exits (included for upcoming updates on sources).
Subdominator Integrations:
Subdominator integrates with various free and Paid API passive sources to gather valuable subdomain information. We would like to give credit to the following websites for providing free-to-obtain API keys for subdomain enumeration. Claim your free API and Paid keys here:
Subdomains Resources:
- VirusTotal*: VirusTotal
- Chaos*: Chaos
- Dnsdumpter*: Dnsdumpster
- Whoisxml*: WhoisXML
- SecurityTrails*: SecurityTrails
- Bevigil*: Bevigil
- Binaryedge*: BinaryEdge
- Fullhunt*: Fullhunt
- Rapidapi*: RapidAPI (requires: Rapid api key)
- Bufferover*: Bufferover
- Certspotter*: Certspotter
- Censys*: Censys
- Fullhunt*: Fullhunt
- Zoomeye*: Zoomeye
- Netlas*: Netlas
- Leakix*: Leakix
- Redhunt*: Redhunt
- Shodan* : Shodan
- Huntermap* : Hunter
- Google*: Google
- Facebook*: Facebook
- Quake*: Quake
- RapidFinder*: RapidFinder (requires: Rapid api key)
- RapidScan*: RapidScan (requires: Rapid api key)
- Fofa*: Fofa
- CodeRog*: CodeRog (requires: Rapid api key)
- C99*: C99
- RSECloud*: RSECloud
- Intelx*: Intelx
- Builtwith*:Builtwith
- Passivetotal*:PassiveTotal
- Trickest*:Trickest
Notification Resources:
- Slack: Slack
- Pushbullet: Pushbullet
Installation:
**Subdominator requires python latest version to be installed and with latest version pip
commandline tool
pip install git+https://github.com/RevoltSecurities/Subdominator
and if any error occured with httpx
package please use this command to install the tool:
pip install git+https://github.com/RevoltSecurities/Subdominator --no-deps==0.25.2
you can also install the tool using pipx and install the latest version by using this command:
pipx install git+https://github.com/RevoltSecurities/Subdominator
Post Installation setup:
subdominator
can be used after installing successfully but if you want to use subdominator efficiently with its maximum level then some source requires API keys to setup and users can use this command:
subdominator -ls
__ __ _ __
_____ __ __ / /_ ____/ / ____ ____ ___ (_) ____ ____ _ / /_ ____ _____
/ ___/ / / / / / __ \ / __ / / __ \ / __ `__ \ / / / __ \ / __ `/ / __/ / __ \ / ___/
(__ ) / /_/ / / /_/ // /_/ / / /_/ / / / / / / / / / / / / // /_/ / / /_ / /_/ / / /
/____/ \__,_/ /_.___/ \__,_/ \____/ /_/ /_/ /_/ /_/ /_/ /_/ \__,_/ \__/ \____/ /_/
@RevoltSecurities
[Version]: Subdominator current version v1.0.9 (latest)
[INFO]: Current Available free passive resources: [51]
[INFO]: Sources marked with an * needs API key(s) or token(s) configuration to works
[INFO]: Hey sanjai you can config your api keys or token here /home/sanjai/.config/Subdominator/provider-config.yaml to work
abuseipDB
alienvault
anubis
bevigil*
binaryedge*
bufferover*
builtwith*
c99*
censys*
certspotter*
chaos*
columbusapi
commoncrawl
crtsh
cyfare
digitorus
dnsdumpster*
dnsrepo
fofa*
facebook*
fullhunt*
google*
hackertarget
huntermap*
intelx*
leakix*
merklemap
myssl
netlas*
passivetotal*
quake*
racent
rapidapi*
rapiddns
redhuntlabs*
rsecloud*
securitytrails*
shodan*
shodanx
shrewdeye
sitedossier
subdomaincenter
trickest*
urlscan
virustotal*
waybackarchive
whoisxml*
zoomeyeapi*
rapidfinder*: Rapidfinder requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/Glavier/api/subdomain-finder3/pricing
rapidscan*: Rapidscan requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/sedrakpc/api/subdomain-scan1/pricing
coderog*: Coderog source required to subscribe for free and please see here: https://rapidapi.com/coderog-coderog-default/api/subdomain-finder5/pricing
here above we can see subdominator resources it uses and resource marked with an (*) need API keys to work and users can collect API keys from those websites and hyperlink will provided
for sources when using command subdominator -ls
every source link provided as a hyperlink so place your cursor on sources will show the hyperlink on your terminal
Keys configurations:
so we saw what are the resources are available for subdominator so now where to paste keys? it easy just see in your ~/$HOME/.config/Subdominator/provider-config.yaml
and all sourcess are available
there, now paste your API keys and One more thing Subdominator follow same keys setup syntax of subfinder and you refer https://docs.projectdiscovery.io/tools/subfinder/install#post-install-configuration but before refering there is only one difference is for zoomeyeapi
in subdominator
which in subfinder
you need to give both host and key ex:
zoomeyeapi:
- zoomeye.hk:AudbAfjHslif_sudf
but in subdominator
you should give only api keys not host for ex:
zooeyeapi:
- AudbAfjHslif_sudf
Now lets come to other resources setup that varies from subfinder:
-
Dnsdumpter Setup:
*Dnsdumpster requires csrf token and cookie to obtain it visit Dnsdumpter: Dnsdumpster Search any domain and Intercept the requests your burp that contains token and cookie. Copy the csrf cookie and crsf tokens value only and paste in your yaml file
-
Google Setup:
- Step 1: First login a google account in your browser
- Step 2: Visit here and create a search engine and choose all web option like below mentioned in images
- Step 3: After Creating your successfull search engine it time to copy your cx id
- Step 4: After completing these all process now its time to grab your api keys of google here
- Step 5: Press the get key button and create a new project with any name you want and click next
- Step 6: After creating and completing your api key is generated and press show key then copy it
- Step 7: Now its time to paste your google cx id and API key in yaml file
google
#cxID:Apikey
- 23892479:AIdjhakbkdiudgiao
So you configured this different resources of subdominator, now follow the other steps to setting up API keys which I mentioned before here: https://github.com/RevoltSecurities/Subdominator/edit/main/README.md#keys-configurations Now After setting up your api keys your provider yaml file looks like
censys:
- 9f5a-be11-4b9e-9564-9596e78:Va92kyMYPS7ANKpI8CjV
facebook:
- 1550699734936481:3b2eff7304659559380ad88d8c4b82f
google:
- 34992b4aee9494e7b:AIzaSyCcEqqOERofbkudEY_iVC2_Wfv0A
intelx:
- 2.intelx.io:1995e804-3c71-4938042-8042802-efa29ae2964d
zoomeyeapi:
- 3833802-b9FF-6E1A5-7d2d-9792d64082adf
- 6F28942CC-ACA5-573E8-d769-99b4c728042d
redhuntlabs:
- https://reconapi.redhuntlabs.com/community/v1/domains/subdomains:VRp7HK3jWiRSnpPfois7979spn4tvDVi0vM
dnsdumpster:
- zsdqYb0rvIVYh2uPHo5Yk4EljV9GEKn44hDL9V2DFXznflW37Q5pZl8pvQHUHWav:Z488EzyPXVwDAhDGlm8gTBvkubRfLyBxuTytPjA17aa2yA5ULO8HySZoG6ptOKoY
and dont forget to collect keys for updated resources, Booyah ⚡ completed , now you can run subdominator
with its maximum and wait for 10-15 minutes then you will have your results.
Security:
Subdominator is a promising tool that will never cause any threats to users or security researcher and its safe to use. Even without Users permissions subdominator will not update itself and I welcome everyone who are intrested contribute for Subdominator can create their issues and report it.
License:
Subdominator is built by RevoltSecurities Team with ❤️ and your support will encourage us to improve the subdominator
more and Community contributors are
Welcome to contribute for subdominator and If you love the subdominator
support it by giving a ⭐ .
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file subdominator-1.0.9.tar.gz
.
File metadata
- Download URL: subdominator-1.0.9.tar.gz
- Upload date:
- Size: 50.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7455acdb52f34556353b5254140013d0865fbb37b6b4c8a2fe22db51d88e45bd |
|
MD5 | 44f46c2c355a42f5324b4ec74bceab3f |
|
BLAKE2b-256 | 3038f757650f043568baadf3542742e3ea8f39976f5cb11269ac87ea95cea3d6 |