Subdomain3 is a new generation of tool , It helps penetration testers to discover more information in a shorter time than other tools.The information includes subdomains, IP, CDN, and so on. Please enjoy it.
Features
Three patterns for speed. User can modify the configuration(lib/config.py) file to speed-up.
Determines whether the subdomain uses CDN storage automatically,even though the dict of CDN severs not contain the cname suffix.
Sorting ip and report CIDR(example 1.1.1.1/24) that it not use CDN storage;
Discover more subdomains,example:admin.test.xx.com
Million of subs support
1 CPU/1GB Memory/1Mbps bandwidth
Discover the fastest nameserver;The strategy of dynamically adjusting of dict by importing subdomains from other sources;Prevent dns cache pollution;
git clone https://github.com/yanxiu0614/subdomain3.git
pip install -r requirement.txt
python2/3 brutedns.py -d tagetdomain -s high -l 5
| Short Form | Long Form | Description |
|---|---|---|
| -d | –domain | target domain,for example: baidu.com |
| -s | –speed | speed,three patterns:fast,medium,low |
| -l | –level | example: 2:w.baidu.com; 3:w.w.baidu.com; |
| -f | –file | The list of target domain |
| -c | –cname | n or y,collect cnames |
| -ns | –default_dns | n or y |
| -f1 | –sub_file | sub dict |
| -f2 | –next_sub_file | next sub dict |
| -f3 | –other_file | subdomain log from search engine |
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…