Skip to main content

Subdominator - An ultimate subdomain enumeration tool for Security Researchers and Bug Bounty Hunters

Project description

Subdominator - Unleash the Power of Subdomain Enumeration

Subdominator

lightweight , fast and more than a passive subdomain enumeration tool

Features | Usage | Installation | Documentation

GitHub last commit GitHub release (latest by date) GitHub license

Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential security vulnerabilities by efficiently enumerating subdomains some various free passive resources.

Features:



  • fast and powerfull to enumerate subdomains.
  • 50+ passive results to enumerate subdomains.
  • configurable API keys setup
  • integrated notification system
  • local Database support to store data
  • supports multiple output format (txt|html|pdf|json)

Yaml Updates:

We request existing user to update their config yaml file with new resources by opening the config file in : $HOME/.config/Subdominator/provider-config.yaml and add the below resources:

builwith:
  - your-api-key1
  - your-api-key2

passivetotal:
  - user-mail1:api-key1
  - user-mail2:api-key2

trickest:
  - your-api-key1
  - your-api-key2

by these your config yaml file will get updated or else check your yaml file that matches the below mentioned resources with *, The new users will required to update in next version if any new resources added in Subdominator.

Usage:


subdominator -h
              |          |                   _)                |
  __|  |   |  __ \    _` |   _ \   __ `__ \   |  __ \    _` |  __|   _ \    __|
\__ \  |   |  |   |  (   |  (   |  |   |   |  |  |   |  (   |  |    (   |  |
____/ \__,_| _.__/  \__,_| \___/  _|  _|  _| _| _|  _| \__,_| \__| \___/  _|


                     @RevoltSecurities



[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources

[USAGE]:

    subdominator [flags]

[FLAGS]:

    [INPUT]:
    
        -d,   --domain                :  Target domain name for subdomain enumeration.
        -dL,  --domain-list           :  File containing multiple domains for bulk enumeration.
        stdin/stdout                  :  Supports input/output redirection.

    [OUTPUT]:
    
        -o,   --output                :  Save results to a file.
        -oD,  --output-directory      :  Directory to save results (useful when -dL is specified).
        -json, --json                 :  Output results in JSON format.
        
    [MODE]:
    
        -shell, --shell               :  Enable interactive shell mode to work with subdominator Database,generate report and etc.

    [OPTIMIZATION]:
    
        -t,   --timeout               :  Set timeout value for API requests (default: 30s).
        -fw,  --filter-wildcards      :  Filter out wildcard subdomains.

    [CONFIGURATION]:
    
        -cp,  --config-path           :  Custom config file path for API keys (default: /home/sanjai/.config/Subdominator/provider-config.yaml).
        -cdp, --config-db-path        :  Custom database config path (default: /home/sanjai/.cache/SubdominatorDB/subdominator.db).
        -nt,  --notify                :  Send notifications for found subdomains via Slack, Pushbullet.
        -px,  --proxy                 :  Use an HTTP proxy for debugging requests.
        -dork, --dork                 :  Use a custom google dork for google resource (ex: -ir google --dork 'site:target.com -www -dev intext:secrets')

    [RESOURCE CONFIGURATION]:
    
        -ir,  --include-resources     :  Specify sources to include (comma-separated).
        -er,  --exclude-resources     :  Specify sources to exclude (comma-separated).
        -all, --all                   :  Use all available sources for enumeration.

    [UPDATE]:
    
        -up,  --update                :  Update Subdominator to the latest version (manual YAML update required).
        -duc, --disable-update-check  :  Disable automatic update checks.
        -sup, --show-updates          :  Show the latest update details.

    [DEBUGGING]:
    
        -h,   --help                  :  Show this help message and exit.
        -v,   --version               :  Show the current version and check for updates.
        -s,   --silent                :  Show only subdomains in output.
        -ski, --show-key-info         :  Show API key errors (e.g., out of credits).
        -sti, --show-timeout-info     :  Show timeout errors for sources.
        -nc,  --no-color              :  Disable colorized output.
        -ls,  --list-source           :  List available subdomain enumeration sources.
        -V,   --verbose               :  Enable verbose output.

Subdominator Integrations:


The following API services used by subdominator:

Installation:


Ensure you have Python 3.12 or later installed before proceeding with the installation. You can verify your Python version using:

python3 --version

Install Subdominator from PyPI (Recommended)

The easiest way to install Subdominator is via PyPI:

pip install --upgrade subdominator

Install the Latest Version from GitHub

To install the latest development version directly from GitHub:

pip install --upgrade git+https://github.com/RevoltSecurities/Subdominator

Install Using PIPX (For Isolated Environments)

To avoid dependency conflicts, you can install Subdominator using pipx:

pipx install subdominator

To install the latest version from GitHub with pipx:

pipx install git+https://github.com/RevoltSecurities/Subdominator

Install from Git Source (For Development)

For users who want to contribute or modify the tool, clone and install directly from source:

git clone https://github.com/RevoltSecurities/Subdominator.git
cd Subdominator
pip install --upgrade pip
pip install -r requirements.txt

After installation, you can verify if Subdominator is installed correctly by running:

subdominator --help

SubDominator Documentation

For complete post-installation configuration, shell interface tutorials, and detailed usage instructions, please refer to the official SubDominator documentation:

🔗 SubDominator Docs

What You’ll Find in the Documentation:

Post Installation Setup – Configure dependencies, API keys, and environment variables.
Shell Interface Tutorial – Learn how to use subdominator -shell for managing subdomains interactively.
Enumeration Techniques – Understand how to efficiently discover subdomains.
Exporting & Reporting – Generate reports in TXT, JSON, HTML, or PDF formats.
Advanced Features & Flags – Explore additional functionalities to enhance subdomain enumeration.

For the best experience, ensure you follow the latest updates in the documentation! 🚀

Security:


Subdominator is a promising tool that will never cause any threats to users or security researcher and its safe to use. Even without Users permissions subdominator will not update itself and I welcome everyone who are intrested contribute for Subdominator can create their issues and report it.

License:


Subdominator is built by RevoltSecurities Team with ❤️ and your support will encourage us to improve the subdominator more and Community contributors are Welcome to contribute for subdominator and If you love the subdominator support it by giving a ⭐ .

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

subdominator-2.1.1.tar.gz (46.3 kB view details)

Uploaded Source

File details

Details for the file subdominator-2.1.1.tar.gz.

File metadata

  • Download URL: subdominator-2.1.1.tar.gz
  • Upload date:
  • Size: 46.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for subdominator-2.1.1.tar.gz
Algorithm Hash digest
SHA256 14e480cc15931b81a67708d16b7390374da21383e76626e91a7b17e1d0328473
MD5 da88509b8ec27403a686d64ed0ddacbd
BLAKE2b-256 4be704512d3690647397573c69cd8670559bf27bd807e0f6b85bc470e6d57cf9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page