Dnssearch is a subdomain enumeration tool. It takes an input domain ( -domain
parameter ) and a wordlist ( -wordlist
parameter ), it will then perform concurrent DNS requests using the lines of the wordlist as sub domains eventually bruteforcing every sub domain available on the top level domain.
It supports a custom file extension ( -ext
, default to php
) and other optional arguments:
Usage of ./dnssearch:
-consumers int
Number of concurrent consumers. (default 8)
-domain string
Base domain to start enumeration from.
-wordlist string
Wordlist file to use for enumeration. (default “names.txt”)
-a bool
Lookup A records ( default true )
-txt bool
Lookup TXT records ( default false )
-cname bool
Show CNAME results ( default false )
Also Read – TaskManager Button Disabler : Simple Way To Disable/Rename Buttons From A Task Manager
go get github.com/evilsocket/dnssearch
cd dnssearch
go build -o dnssearch main.go
docker build -t dnssearch .
docker run -it –rm dnssearch
Credits: Simone Margaritelli
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…