Sub.sh : Online Subdomain Detect Script

Sub.sh is a script to detect subdomain online. So let us have a look on it usage.

Script

bash sub.sh webscantest.com
./sub.sh webscantest.com

Curl

curl -s -L https://raw.githubusercontent.com/cihanmehmet/sub.sh/master/sub.sh | bash -s webscantest.com

Also Read – Re-composer : Randomly Changes Win32/64 PE Files For ‘Safer’ Uploading To Malware & Sandbox Sites

Subdomain Alive Check

bash sub_alive.sh bing.com
curl -s -L https://raw.githubusercontent.com/cihanmehmet/sub.sh/master/sub_alive.sh | bash -s bing.com”

Fping Required

Nmap -sn (No port scan) scan live IP detection script

fping -f ip.txt

Usage bash nmap_sn.sh ip.txt

#!/bin/bash

nmap -sn -iL $1 |grep “Nmap scan report for”|grep -Eo “(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)”|sort -u |tee $1.txt

echo “Detect IP $(wc -l $1.txt|awk ‘{ print $1 }’ )” “=> result_${1}” “saved”
echo “File Location : “$(pwd)/”result_$1”

Sample usage

Usage 1(fping)fping dart

cat domains.txt | dnsgen – |fping|grep “alive”|cut -d ” ” -f1>resolvers.txt

Usage 2(httprobe ) dart

cat domains.txt | dnsgen – |httprobe|cut -d “/” -f3|sort -u |tee resolvers.txt

R K

Recent Posts

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

4 hours ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

18 hours ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

1 day ago

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago