Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains

Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported platforms are 64 bits.

How it works?

It tool doesn’t use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it tool very faster and reliable. The tool make use of multiple public available APIs to perform the search.

If you want to know more about Certificate Transparency logs, read https://www.certificate-transparency.org/

APIs that we using at the moment:

If you know other that should be added, open an issue.

Also Read – SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

Installation Linux Using Source Code

If you want to install it, you can do that manually compiling the source or using the precompiled binary.

Manually: You need to have Rust installed in your computer first.

$ git clone https://github.com/Edu4rdSHL/findomain.git
$ cd findomain
$ cargo build –release
$ sudo cp target/release/findomain /usr/bin/
$ findomain

Installation Linux Using Compiled Artifices

$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux
$ chmod +x findomain-linux
$ ./findomain-linux

If you are using the BlackArch Linux distribution, you just need to use:

$ sudo pacman -S findomain

Installation Windows

Download the binary from https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe

Open a CMD shell and go to the dir where findomain-windows.exe was downloaded.

Exec: findomain-windows in the CMD shell.

Installation MacOS

$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-osx
$ chmod +x findomain-osx.dms
$ ./findomain-osx.dms

Usage

You can use the tool in two ways, only discovering the domain name or discovering the domain + the IP address.

findomain 0.1.4
Eduard Tolosa tolosaeduard@gmail.com
A tool that use Certificates Transparency logs to find subdomains.

USAGE:
findomain [FLAGS] [OPTIONS]

FLAGS:
-a, –all-apis Use all the available APIs to perform the search. It take more time but you will have a lot of
more results.
-h, –help Prints help information
-i, –get-ip Return the subdomain list with IP address if resolved.
-V, –version Prints version information

OPTIONS:
-f, –file Sets the input file to use.
-o, –output Write data to output file in the specified format. [possible values: txt, csv, json]
-t, –target Target host

Examples

  1. Make a simple search of subdomains and print the info in the screen:

findomain -t example.com

  1. Make a simple search of subdomains using all the APIs and print the info in the screen:

findomain -t example.com -a

  1. Make a search of subdomains and export the data to a CSV file:

findomain -t example.com -o csv

  1. Make a search of subdomains using all the APIs and export the data to a CSV file:

findomain -t example.com -a -o csv

  1. Make a search of subdomains and resolve the IP address of subdomains (if possible):

findomain -t example.com -i

  1. Make a search of subdomains with all the APIs and resolve the IP address of subdomains (if possible):

findomain -t example.com -i -a

  1. Make a search of subdomains with all the APIs and resolve the IP address of subdomains (if possible), exporting the data to a CSV file:

findomain -t example.com -i -a -o csv

Features

  • Discover subdomains without brute-force, it tool uses Certificate Transparency Logs.
  • Discover subdomains with or without IP address according to user arguments.
  • Read target from user argument (-t).
  • Read a list of targets from file and discover their subdomains with or without IP and also write to output files per-domain if specified by the user, recursively.
  • Write output to TXT file.
  • Write output to CSV file.
  • Write output to JSON file.
  • Cross platform support: Linux, Windows, MacOS.
  • Optional multiple API support.
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago