Turbolist3r is a fork of the sublist3r subdomain discovery tool. In addition to the original OSINT capabilties of sublist3r, turbolist3r automates some analysis of the results, with a focus on subdomain takeover.
Turbolist3r queries public DNS servers for each discovered subdomain. If the subdomain exists (i.e. the resolver replied with an address), the answer is categorized as CNAME or A record. By examining A records, it is possible to discover potential penetration testing targets for a given domain. Likewise, the process of looking for subdomain takeovers is simple; view the discovered CNAME records and investigate any that point to applicable cloud services.
Please do not use for illegal purposes.
Also Read – AttackSurfaceMapper : Tool That Aims To Automate The Reconnaissance Process
Usage
Short Form | Long Form | Description |
---|---|---|
-d | –domain | Domain name to enumerate subdomains of |
-b | –bruteforce | Enable the subbrute bruteforce module |
-p | –ports | Scan the found subdomains against specific tcp ports |
-v | –verbose | Enable the verbose mode and display results in realtime |
-t | –threads | Number of threads to use for subbrute bruteforce |
-e | –engines | Specify a comma-separated list of search engines |
-o | –output | Save discovered domain names to specified text file |
-h | –help | show the help message and exit |
-a | –analyze | Do reverse DNS analysis and output results |
(none) | –saverdns | Save reverse DNS analysis to specified file |
(none) | –inputfile | Read domains from specified file, and use them for analysis |
(none) | –debug | Print debug information during the analysis module (-a). Prints mostly raw DNS data, familarity with the DIG Linux DNS utility and it’s output is helpful to interpret the debug output |
-r | –resolvers | File with DNS servers to populate as resolvers. File must have only one server IP address per line and only IP addresses are accepted |
-q | –quiet | Only print found domains and/or CNAME mappings. Note errors may be printed as well |
Examples
python turbolist3r.py -h
python turbolist3r.py -d example.com -a –saverdns analysis_file.txt
python turbolist3r.py -d example.com -a –inputfile subdomains.txt
python turbolist3r.py -d example.com -a –inputfile subdomains.txt -r dns_servers.txt
python turbolist3r.py -d example.com
python turbolist3r.py -d example.com -o example_hosts.txt
python turbolist3r.py -v -d example.com
python turbolist3r.py -b -d example.com
python turbolist3r.py -e google,yahoo,virustotal -d example.com
Dependencies
Turbolist3r depends on the dnslib
, requests
, and argparse
python modules. The subbrute
module is required for bruteforce capability, but Turbolist3r should
run without it as long as you don’t invoke bruteforce. Submit a PR or
contact me if you have issues.
dnslib Module
The dnslib module can be downloaded from https://bitbucket.org/paulc/dnslib/ or installed on many systems using:
pip install dnslib
Requests Module
sudo apt-get install python-requests
sudo yum install python-requests
sudo pip install requests
Argparse Module
sudo apt-get install python-argparse
sudo yum install python-argparse
sudo pip
install argparse
Screenshots
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…