Dnsbruter - Active Subdomain Enumeration Tool
Dnsbruter is a command-line tool designed for active subdomain enumeration through brute-forcing techniques. It helps security researchers and penetration testers discover potential subdomains for a given target domain. The tool allows users to customize their search and provides options for saving and displaying results.
Features
Dnsbruter comes with the following features:
- -d or --domain: Specify the target domain for subdomain enumeration.
- -o or --output: Save the results of the enumeration to a specified output file.
- -v: Enable verbose mode to display found and valid domains.
- -i or --invalid: Print invalid domains during the enumeration process.
- -t or --threads: Define the number of threads to use for faster processing.
Installation
Linux Users (Binary)
For Linux users, you can move the provided binary file to a directory included in your system's PATH. This allows you to use the tool from anywhere in the terminal.
-
Download the binary file from the Releases section of the repository.
-
Move the binary file to a location included in your system's PATH, such as
/usr/local/bin/
:sudo mv dnsbruter /usr/local/bin/
-
Make the binary file executable:
sudo chmod +x /usr/local/bin/dnsbruter
All Users
If you prefer to run the tool directly using Python, follow these steps:
-
Clone the repository:
git clone https://github.com/sanjai-AK47/Dnsbruter.git cd Dnsbruter
-
Install the dependencies from the
requirements.txt
file:pip install -r requirements.txt
-
Run the tool using the Python file:
python dnsbruter.py [options]
Usage
To start using Dnsbruter, use the following command-line options:
python3 dnsbruter.py -h
usage: dnsbruter.py [-h] [-d DOMAIN] [-w WORDLIST] [-o OUTPUT] [-v] [-t THREADS] [-i]
[INFO]: A Subdomain Brutforcer for active subomain enumeration
options:
-h, --help show this help message and exit
-d DOMAIN, --domain DOMAIN
[INFO]: Domain name for active subdomain enumeration
-w WORDLIST, --wordlist WORDLIST
[INFO]: Wordlist that contains list of subdomain for brutforcing
-o OUTPUT, --output OUTPUT
[INFO]: Filename to save the output
-v, --verbose [INFO]: Enabling verbose will print the found subdomain
-t THREADS, --threads THREADS
[INFO]: Thread level to make the process to Multiprocess
-i, --invalid INVALIDS
[INFO]: Enabling invalid will print the invalid or not found subdomains
Example:
dnsbruter -d example.com -o output.txt -v -i -t 10
This command will perform active subdomain enumeration on the example.com
domain using 10 threads, save the results to output.txt
, display found and valid domains in verbose mode, and print invalid domains during the enumeration process.
Please note that using this tool for any unauthorized or malicious activities is strictly prohibited. Make sure to obtain proper authorization before scanning any target.
Contributing
If you find any issues or have ideas to improve Dnsbruter, feel free to contribute to the project. You can create pull requests or open issues on the GitHub repository.
We hope this tool proves useful for your subdomain enumeration needs. Happy hacking!