Kali Linux

Probable_Subdomains : Subdomains Analysis And Generation Tool

Probable_Subdomains is a Subdomains Analysis And Generation Tool

Online tool: https://weakpass.com/generate/domains

TL;DR

During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a room when you need to launch amass, subfinder, sublister, or any other tool to find subdomains you can use to break through – like test.google.com, dev.admin.paypal.com or staging.ceo.twitter.com. Within this repository, you will be able to find out the answers to the following questions:

  1. What are the most popular subdomains?
  2. What are the most common words in multilevel subdomains on different levels?
  3. What are the most used words in subdomains?

And, of course, wordlists for all of the questions above!

Methodology

As sources, I used lists of subdomains from public bugbounty programs, that were collected by chaos.projectdiscovery.io, bounty-targets-data or that just had responsible disclosure programs with a total number of 6831 domains! If subdomains appear more than in 5-10 different scopes, they will be put in a certain list. For example, if dev.stg appears both in *.google.com and *.twitter.com, it will have a frequency of 2. It does not matter how often dev.stg appears in *.google.com. That’s all – nothing more, nothing less.

Lists

Subdomains

In these lists you will find most popular subdomains as is.

NameWords countSize
subdomains.txt.gz24837884522MB
subdomains_top100.txt100655B
subdomains_top1000.txt10006.9KB
subdomains_top10000.txt1000072KB

Subdomain levels

In these lists, you will find the most popular words from subdomains split by levels. F.E – dev.stg subdomain will be split into two words dev and stg. dev will have level = 2, stg – level = 1. You can use these wordlists for combinatory attacks for subdomain searches. There are several types of level.txt wordlists that follow the idea of subdomains.

NameWords countSize
level_1.txt.gz7703788148MB
level_2.txt.gz11379683131MB
level_3.txt.gz115851514MB
level_4.txt.gz1797192.7MB
level_5.txt.gz73384860KB
level_1_top100.txt100620B
level_1_top1000.txt10006.3K
level_2_top100.txt100550B
level_2_top1000.txt10005.8KB
level_3_top100.txt100553B
level_3_top1000.txt10005.2KB
level_4_top100.txt100530B
level_4_top1000.txt10005.1KB
level_5_top100.txt100444B
level_5_top1000.txt10005.1KB

Popular splitted subdomains

In these lists, you will find the most popular splitted words from subdomains on all levels. For example – dev.stg subdomain will be splitted in two words dev and stg.

NameWords countSize
words.txt.gz20305456293MB
words_top100.txt100596B
words_top1000.txt10005.6KB
words_top10000.txt1000062KB

Dropbox

You can download all the files from Dropbox

Attributions

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

22 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

22 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago