Knock is a python tool designed to enumerate subdomains on a target domain through a wordlist.
It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically if it is enabled.
Now knockpy supports queries to VirusTotal subdomains, you can setting the API_KEY within the config.json file.
$ knockpy domain.com
If you want to save full log like this one just type:
$ knockpy domain.com –json
Also Read:DjangoHunter : Tool To Identify Incorrectly Configured Django Applications
$ sudo apt-get install python-dnspython
$ git clone https://github.com/guelfoweb/knock.git
$ cd knock
$ nano knockpy/config.json <- set your virustotal API_KEY
$ sudo python setup.py install
Note : It’s recommended to use Google DNS: 8.8.8.8 and 8.8.4.4
$ knockpy -h
usage: knockpy [-h] [-v] [-w WORDLIST] [-r] [-c] [-j] domain
knock subdomain scan
knockpy v.4.1
Author: Gianni ‘guelfoweb’ Amato
Github: https://github.com/guelfoweb/knock
positional arguments:
domain target to scan, like domain.com
optional arguments:
-h, –help show this help message and exit
-v, –version show program’s version number and exit
-w WORDLIST specific path to wordlist file
-r, –resolve resolve ip or domain name
-c, –csv save output in csv
-f, –csvfields add fields name to the first row of csv output file
-j, –json export full report in JSON
example:
knockpy domain.com
knockpy domain.com -w wordlist.txt
knockpy -r domain.com or IP
knockpy -c domain.com
Note : For virustotal subdomains support you can setting your API_KEY in the config.json file.
Credit: Gianni ‘guelfoweb’ Amato
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…