Skip to main content

Subdominator - An ultimate subdomain enumeration tool for Security Researchers and Bug Bounty Hunters

Project description

Subdominator

Subdominator - Unleash the Power of Subdomain Enumeration

Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential security vulnerabilities by efficiently enumerating subdomains some various free passive resources.

GitHub last commit GitHub release (latest by date) GitHub license LinkedIn

Features:


  • fast and powerfull to enumerate subdomains.
  • 50+ passive results to enumerate subdomains.
  • configurable API keys setup
  • Integrated notification system

Info:

We request existing user to update their config yaml file with new resources by opening the config file in : bash $HOME/.config/Subdominator/provider-config.yaml and add the below resources:

builwith:
  - your-api-key1
  - your-api-key2

passivetotal:
  - user-mail1:api-key1
  - user-mail2:api-key2

trickest:
  - your-api-key1
  - your-api-key2

by these your config yaml file will get updated or else check your yaml file that matches the below mentioned resources with *, The new users will required to update in next version if any new resources added in Subdominator.

Usage:

subdominator -h
              |          |                   _)                |
  __|  |   |  __ \    _` |   _ \   __ `__ \   |  __ \    _` |  __|   _ \    __|
\__ \  |   |  |   |  (   |  (   |  |   |   |  |  |   |  (   |  |    (   |  |
____/ \__,_| _.__/  \__,_| \___/  _|  _|  _| _| _|  _| \__,_| \__| \___/  _|


                     @RevoltSecurities



[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources

[USAGE]:

    subdominator [flags]

[FLAGS]:

    [INPUT]:

        -d,   --domain                  :  domain name to enumerate subdomains.
        -dL,  --domain-list             :  filename that contains domains for subdomain enumeration.
        stdin/stdout                    :  subdominator now supports stdin/stdout

    [OUTPUT]:

        -o,   --output                  :  filename to save the outputs.
        -oD,  --output-directory        :  directory name to save the outputs (use it when -dL is flag used).
        -oJ,  --output-json             :  filename to save output in json fromat

    [OPTIMIZATION]:

        -t,   --timeout                 :  timeout value for every sources requests.

    [UPDATE]:

        -up,   --update                 :  update subdominator for latest version but yaml source update required manual to not affect your api keys configurations.
        -duc, --disable-update-check    :  disable automatic update check for subdominator
        -sup, --show-updates            :  shows latest version updates of subdominator

    [CONFIG]:

        -nt,  --notify                  :  send notification of found subdomain using source Slack, Pushbullet, Telegram, Discord
        -p,   --proxy                   :  http proxy to use with subdominator (intended for debugging the performance of subdominator).
        -cp,  --config-path             :  custom path of config file for subdominator to read api keys ( default path: /home/sanjai/.config/Subdominator/provider-config.yaml)
        -fw,  --filter-wildcards        :  filter the found subdomains with wildcards and give cleaned output

    [DEBUG]:

        -h,   --help                    :  displays this help message and exits
        -s,   --silent                  :  show only subdomain in output (this is not included for -ski,-sti)
        -v,   --version                 :  show current version of subdominator and latest version if available and exits
        -ski, --show-key-info           :  show keys error for out of credits and key not provided for particular sources
        -ste, --show-timeout-info       :  show timeout error for sources that are timeout to connect
        -nc,  --no-color                :  disable the colorised output of subdominator
        -ls,  --list-source             :  display the sources of subdominator uses for subdomain enumerations and exits (included for upcoming updates on sources).

Subdominator Integrations:

Subdominator integrates with various free and Paid API passive sources to gather valuable subdomain information. We would like to give credit to the following websites for providing free-to-obtain API keys for subdomain enumeration. Claim your free API and Paid keys here:

Subdomains Resources:

Notification Resources:

Installation:

**Subdominator requires python latest version to be installed and with latest version pip commandline tool

pip install git+https://github.com/RevoltSecurities/Subdominator

and if any error occured with httpx package please use this command to install the tool:

pip install git+https://github.com/RevoltSecurities/Subdominator --no-deps==0.25.2

you can also install the tool using pipx and install the latest version by using this command:

pipx install git+https://github.com/RevoltSecurities/Subdominator

Post Installation setup:

subdominator can be used after installing successfully but if you want to use subdominator efficiently with its maximum level then some source requires API keys to setup and users can use this command:

subdominator -ls
                    __         __                       _                    __                
   _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____
  / ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/
 (__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    
/____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     
                                                                                               

                     @RevoltSecurities

[Version]: Subdominator current version v1.0.9 (latest)
[INFO]: Current Available free passive resources: [51]
[INFO]: Sources marked with an * needs API key(s) or token(s) configuration to works
[INFO]: Hey sanjai you can config your api keys or token here /home/sanjai/.config/Subdominator/provider-config.yaml to work
abuseipDB
alienvault
anubis
bevigil*
binaryedge*
bufferover*
builtwith*
c99*
censys*
certspotter*
chaos*
columbusapi
commoncrawl
crtsh
cyfare
digitorus
dnsdumpster*
dnsrepo
fofa*
facebook*
fullhunt*
google*
hackertarget
huntermap*
intelx*
leakix*
merklemap
myssl
netlas*
passivetotal*
quake*
racent
rapidapi*
rapiddns
redhuntlabs*
rsecloud*
securitytrails*
shodan*
shodanx
shrewdeye
sitedossier
subdomaincenter
trickest*
urlscan
virustotal*
waybackarchive
whoisxml*
zoomeyeapi*
rapidfinder*: Rapidfinder requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/Glavier/api/subdomain-finder3/pricing
rapidscan*: Rapidscan requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/sedrakpc/api/subdomain-scan1/pricing
coderog*: Coderog source required to subscribe for free and please see here: https://rapidapi.com/coderog-coderog-default/api/subdomain-finder5/pricing

here above we can see subdominator resources it uses and resource marked with an (*) need API keys to work and users can collect API keys from those websites and hyperlink will provided for sources when using command subdominator -ls every source link provided as a hyperlink so place your cursor on sources will show the hyperlink on your terminal

Keys configurations:

so we saw what are the resources are available for subdominator so now where to paste keys? it easy just see in your ~/$HOME/.config/Subdominator/provider-config.yaml and all sourcess are available there, now paste your API keys and One more thing Subdominator follow same keys setup syntax of subfinder and you refer https://docs.projectdiscovery.io/tools/subfinder/install#post-install-configuration but before refering there is only one difference is for zoomeyeapi in subdominator which in subfinder you need to give both host and key ex:

zoomeyeapi:
   - zoomeye.hk:AudbAfjHslif_sudf

but in subdominator you should give only api keys not host for ex:

zooeyeapi:
   - AudbAfjHslif_sudf

Now lets come to other resources setup that varies from subfinder:

  • Dnsdumpter Setup:

    *Dnsdumpster requires csrf token and cookie to obtain it visit Dnsdumpter: Dnsdumpster Search any domain and Intercept the requests your burp that contains token and cookie. Copy the csrf cookie and crsf tokens value only and paste in your yaml file


  • Google Setup:

    • Step 1: First login a google account in your browser
    • Step 2: Visit here and create a search engine and choose all web option like below mentioned in images


    • Step 3: After Creating your successfull search engine it time to copy your cx id
    • Step 4: After completing these all process now its time to grab your api keys of google here
    • Step 5: Press the get key button and create a new project with any name you want and click next
    • Step 6: After creating and completing your api key is generated and press show key then copy it
    • Step 7: Now its time to paste your google cx id and API key in yaml file
google
  #cxID:Apikey
  - 23892479:AIdjhakbkdiudgiao

So you configured this different resources of subdominator, now follow the other steps to setting up API keys which I mentioned before here: https://github.com/RevoltSecurities/Subdominator/edit/main/README.md#keys-configurations Now After setting up your api keys your provider yaml file looks like

censys: 
  - 9f5a-be11-4b9e-9564-9596e78:Va92kyMYPS7ANKpI8CjV

facebook:
  - 1550699734936481:3b2eff7304659559380ad88d8c4b82f

google:
   - 34992b4aee9494e7b:AIzaSyCcEqqOERofbkudEY_iVC2_Wfv0A

intelx:
  - 2.intelx.io:1995e804-3c71-4938042-8042802-efa29ae2964d

zoomeyeapi:
   - 3833802-b9FF-6E1A5-7d2d-9792d64082adf
   - 6F28942CC-ACA5-573E8-d769-99b4c728042d

redhuntlabs: 
  - https://reconapi.redhuntlabs.com/community/v1/domains/subdomains:VRp7HK3jWiRSnpPfois7979spn4tvDVi0vM

dnsdumpster:
  - zsdqYb0rvIVYh2uPHo5Yk4EljV9GEKn44hDL9V2DFXznflW37Q5pZl8pvQHUHWav:Z488EzyPXVwDAhDGlm8gTBvkubRfLyBxuTytPjA17aa2yA5ULO8HySZoG6ptOKoY

and dont forget to collect keys for updated resources, Booyah ⚡ completed , now you can run subdominator with its maximum and wait for 10-15 minutes then you will have your results.

Security:

Subdominator is a promising tool that will never cause any threats to users or security researcher and its safe to use. Even without Users permissions subdominator will not update itself and I welcome everyone who are intrested contribute for Subdominator can create their issues and report it.

License:

Subdominator is built by RevoltSecurities Team with ❤️ and your support will encourage us to improve the subdominator more and Community contributors are Welcome to contribute for subdominator and If you love the subdominator support it by giving a ⭐ .

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

subdominator-1.0.9.tar.gz (50.3 kB view details)

Uploaded Source

File details

Details for the file subdominator-1.0.9.tar.gz.

File metadata

  • Download URL: subdominator-1.0.9.tar.gz
  • Upload date:
  • Size: 50.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for subdominator-1.0.9.tar.gz
Algorithm Hash digest
SHA256 7455acdb52f34556353b5254140013d0865fbb37b6b4c8a2fe22db51d88e45bd
MD5 44f46c2c355a42f5324b4ec74bceab3f
BLAKE2b-256 3038f757650f043568baadf3542742e3ea8f39976f5cb11269ac87ea95cea3d6

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page