Subdominator:一款针对漏洞奖励计划的子域名安全枚举工具

关于Subdominator

Subdominator是一款针对漏洞奖励计划的子域名安全枚举工具,可用于在漏洞搜寻和侦察过程中进行被动子域名枚举。它旨在通过高效枚举子域名和各种免费被动资源来帮助研究人员和网络安全专业人员发现潜在的安全漏洞。

Subdominator 与各种免费和付费 API 被动源集成,以收集有价值的子域信息。

功能介绍

1、能够快速、强大地子域名枚举能力;

2、45+ 被动结果枚举子域;

3、可配置 API 密钥设置;

4、综合通知系统;

工具要求

aiofiles>=23.2.1

aiohttp>=3.9.4

appdirs>=1.4.4

art>=6.1

beautifulsoup4>=4.11.1

colorama>=0.4.6

fake_useragent>=1.5.0

PyYAML>=6.0.1

Requests>=2.31.0

rich>=13.7.1

urllib3>=1.26.18

工具安装

由于该工具基于Python 3开发,因此我们首先需要在本地设备上安装并配置好最新版本的Python 3环境。

接下来,广大研究人员可以直接使用下列命令将该项目源码克隆至本地:

git clone https://github.com/RevoltSecurities/Subdominator.git

然后切换到项目目录中,使用pip命令和项目提供的requirements.txt安装该工具所需的其他依赖组件:

cd Subdominatorpip install -r requirements.txt

或直接使用pip命令行工具安装最新版本的Subdominator:

pip install git+https://github.com/RevoltSecurities/Subdominator

Subdominator安装成功后即可使用,但如果想以最高级别高效地使用 subdominator,则某些源需要 API 密钥来设置,用户可以使用此命令:

subdominator -ls
__         __                       _                    __                _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____/ ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/(__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    /____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     @RevoltSecurities[Version]: Subdominator current version v1.0.8 (latest)[INFO]: Current Available free passive resources: [45][INFO]: Sources marked with an * needs API key(s) or token(s) configuration to works[INFO]: Hey sanjai you can config your api keys or token here /home/sanjai/.config/Subdominator/provider-config.yaml to workabuseipDB                                                                                                                                                                                                                                     alienvault                                                                                                                                                                                                                                    anubis                                                                                                                                                                                                                                        bevigil*                                                                                                                                                                                                                                      binaryedge*                                                                                                                                                                                                                                   bufferover*                                                                                                                                                                                                                                   c99*                                                                                                                                                                                                                                          censys*                                                                                                                                                                                                                                       certspotter*                                                                                                                                                                                                                                  chaos*                                                                                                                                                                                                                                        columbusapi                                                                                                                                                                                                                                   crtsh                                                                                                                                                                                                                                         digitorus                                                                                                                                                                                                                                     dnsdumpster*                                                                                                                                                                                                                                  dnsrepo                                                                                                                                                                                                                                       fofa*                                                                                                                                                                                                                                         facebook*                                                                                                                                                                                                                                     fullhunt*                                                                                                                                                                                                                                     google*                                                                                                                                                                                                                                       hackertarget                                                                                                                                                                                                                                  huntermap*                                                                                                                                                                                                                                    intelx*                                                                                                                                                                                                                                       leakix*                                                                                                                                                                                                                                       myssl                                                                                                                                                                                                                                         netlas*                                                                                                                                                                                                                                       quake*                                                                                                                                                                                                                                        racent                                                                                                                                                                                                                                        rapidapi*                                                                                                                                                                                                                                     rapiddns                                                                                                                                                                                                                                      redhuntlabs*                                                                                                                                                                                                                                  rsecloud*                                                                                                                                                                                                                                     securitytrails*                                                                                                                                                                                                                               shodan*                                                                                                                                                                                                                                       shodanx                                                                                                                                                                                                                                       shrewdeye                                                                                                                                                                                                                                     sitedossier                                                                                                                                                                                                                                   subdomaincenter                                                                                                                                                                                                                               urlscan                                                                                                                                                                                                                                       virustotal*                                                                                                                                                                                                                                   waybackarchive                                                                                                                                                                                                                                whoisxml*                                                                                                                                                                                                                                     zoomeyeapi*                                                                                                                                                                                                                                   rapidfinder*: Rapidfinder requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/Glavier/api/subdomain-finder3/pricing                                                              rapidscan*: Rapidscan requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/sedrakpc/api/subdomain-scan1/pricing                                                                   coderog*: Coderog source required to subscribe for free and please see here: https://rapidapi.com/coderog-coderog-default/api/subdomain-finder5/pricing   

工具使用

subdominator -h
__         __                       _                    __                _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____/ ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/(__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    /____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     @RevoltSecurities[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources[USAGE]:subdominator [flags][FLAGS]:[INPUT]:-d,--domain:枚举子域的域名;-dL,--domain-list:包含用于枚举子域的域的文件名;stdout:子域支持 stdout 以将其输出通过管道传输;[OUTPUT]:-o,--output:用于保存输出的文件名;-oD,--output-directory:用于保存输出的目录名(使用 -dL 标志时使用它);[OPTIMIZATION]:-t,--timeout:每个源请求的超时值。    [Update]:-up,--update:更新子域以获取最新版本,但 yaml 源更新需要手动操作,以免影响您的 api 密钥配置;-duc, --disable-update-check :禁用 subdominator 的自动更新检查;-sup, --show-updates :显示 subdominator 的最新版本更新;[CONFIG]:-nt, --notify :使用源 Slack、Pushbullet、Telegram、Discord 发送发现子域的通知;-p, --proxy :与 subdominator 一起使用的 http 代理(用于调试 subdominator 的性能);-cp, --config-path :subdominator 读取 api 密钥的配置文件的自定义路径(默认路径:/home/sanjai/.config/Subdominator/provider-config.yaml);        [DEBUG]:-h, --help :显示此帮助消息并退出;-v, --version :显示 subdominator 的当前版本和最新版本(如果可用)并退出;-ske, --show-key-error :显示特定来源的信用不足和未提供密钥的密钥错误;-sre, --show-timeout-error :显示连接超时的来源的超时错误;-nc, --no-color :禁用 subdominator 的彩色输出;-ls, --list-source :显示 subdominator 用于子域枚举和退出的来源;

工具运行截图

许可证协议

本项目的开发与发布遵循MIT开源许可协议。

项目地址

Subdominator:【GitHub传送门】

参考资料

Installing Subfinder - ProjectDiscovery Documentation

DNSDumpster.com - dns recon and research, find and lookup dns records

https://programmablesearchengine.google.com/controlpanel/create

https://developers.google.com/custom-search/v1/introduction

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.rhkb.cn/news/434869.html

如若内容造成侵权/违法违规/事实不符,请联系长河编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

计算机前沿技术-人工智能算法-大语言模型-最新研究进展-2024-09-24

计算机前沿技术-人工智能算法-大语言模型-最新研究进展-2024-09-24 1. Enriching Datasets with Demographics through Large Language Models: What’s in a Name? K AlNuaimi, G Marti, M Ravaut, A AlKetbi, A Henschel… - arXiv preprint arXiv …, 2024 通过大型语言…

python获取百度地图路径规划

自制语音助手想做一个查询交通路线的功能,于是就想到了百度地图。在百度地图的服务器端应用中,提供了“轻量级路线规划”API接口,正好可以满足需求。要用这个接口,需要注册百度地图账号并创建一个服务器端的应用。有关开通百度地图…

Docekrfile和docker compose编写指南及注意事项

Dockerfile 基础语法 我们通过编写dockerfile,将每一层要做的事情使用语法固定下来,之后运行指令就可以通过docker来制作自己的镜像了。 构建镜像的指令:docker build /path -t imageName:tag 注意,docker build后的path必须是dockerfile…

Selenium与数据库结合:数据爬取与存储的技术实践

目录 一、Selenium与数据库结合的基础概念 1.1 Selenium简介 1.2 数据库简介 1.3 Selenium与数据库结合的优势 二、Selenium爬取数据的基本步骤 2.1 环境准备 2.2 编写爬虫代码 2.3 数据提取 2.4 异常处理 三、数据存储到数据库 3.1 数据库连接 3.2 数据存储 3.3 …

网络编程(10)——json序列化

十、day10 今天学习如何使用jsoncpp将json数据解析为c对象,将c对象序列化为json数据。jsoncp经常在网络通信中使用,也就是服务器和客户端的通信一般使用json(可视化好);而protobuf一般在服务器之间的通信中使用 json…

【YashanDB知识库】yashandb执行包含带oracle dblink表的sql时性能差

本文内容来自YashanDB官网,具体内容请见https://www.yashandb.com/newsinfo/7396959.html?templateId1718516 问题现象 yashandb执行带oracle dblink表的sql性能差: 同样的语句,同样的数据,oracle通过dblink访问远端oracle执行…

可视化服务编排:jvs-logic API出参加密实战教程

在现代软件开发与系统集成的过程中,API(应用程序接口)非常重要,它能使不同系统之间连接,进行数据交换和功能调用。当然,数据交换的数据安全肯定是不可忽视的,为了确保数据在传输过程中的保密性和…

虫情测报灯的工作原理

TH-CQ3】果园、森林等区域病虫害的实时监测、预警和科学管理。病虫害监测系统通常由以下几个部分组成:包括图像传感器、声音传感器、气象传感器等,用于实时采集作物及其周围环境的数据,如叶片变化、虫鸣声、温度、湿度、光照等。对采集到的数…

基于RealSense D435相机实现手部姿态重定向

基于Intel RealSense D435相机和MediaPipe的手部姿态检测,进一步简单实现手部姿态与机器人末端的重定向,获取手部的6D坐标(包括位置和姿态)。 假设已经按照【基于 RealSenseD435i相机实现手部姿态检测】配置好所需的库和环境&…

海口网站建设的最佳实践

海口网站建设的最佳实践 随着互联网的迅猛发展,海口的企业和个人越来越重视网站建设。一个高质量的网站不仅能提升企业形象,还能有效促进品牌传播和业务发展。以下是海口网站建设的一些最佳实践,希望能为相关从业者提供帮助。 1. 明确目标和…

一文说清楚:如何学习好K8s、OpenStack、Docker、Linux?

大家好,我是你们熟悉的-CloudJourney。在这个信息爆炸的时代,我一直致力于通过博客、公众号等平台,与大家分享关于Linux、K8S、Docker、网络、服务器以及OpenStack等前沿技术的见解与心得。然而,随着交流的深入,我逐渐…

[论文精读]TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor

期刊名称:IEEE Transactions on Information Forensics and Security 发布链接:TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor | IEEE Journals & Magazine | IEEE Xplore 中文译名:TorWard:…

EDM平台大比拼 用户体验与营销效果双重测评

本文评测了ZohoCampaigns、Mailchimp、Sendinblue、AWeber四款EDM平台,分别适合中小企业、多平台集成、多功能集成、初学者等需求。建议企业根据自身规模、技术水平和功能需求选择最适合的平台。 一、Zoho Campaigns 功能概述 Zoho Campaigns是Zoho旗下的一款专注…

前端框架:选择的艺术

一、简介 在现代 web 开发中,前端框架扮演着至关重要的角色。 首先,它们极大地提升了开发效率。以 React、Vue 和 Angular 为例,这些框架采用组件化的开发模式,允许开发者将页面拆分成独立的、可复用的组件。例如,在一…

学校周赛(2)

A.Minimize! 题目 思路 本题只需要遍历c的取值&#xff0c;实时更新答案即可 代码 #include<iostream> #include<algorithm> using namespace std;void todo(){int a,b;cin>>a>>b;int ansINT_MAX;for(int ca;c<b;c){ansmin(ans,(c-a)(b-c));}co…

面试题:MySQL你用过WITH吗?领免费激活码

感谢Java面试教程的Java多线程文章&#xff0c;点击查看>原文 Java面试教程&#xff0c;发mmm116可获取IDEA-jihuoma 在MySQL中&#xff0c;WITH子句用于定义临时表或视图&#xff0c;也称为公共表表达式&#xff08;CTE&#xff09;。它允许你在一个查询中定义一个临时结果…

耳机检测系统源码分享

耳机检测检测系统源码分享 [一条龙教学YOLOV8标注好的数据集一键训练_70全套改进创新点发刊_Web前端展示] 1.研究背景与意义 项目参考AAAI Association for the Advancement of Artificial Intelligence 项目来源AACV Association for the Advancement of Computer Vision …

spring-boot 整合 mybatis

文章目录 Spring boot 整合Mybatis将数据返回到浏览器1、准备数据2. 创建一个 pojo 包&#xff0c;创建User实体类3. 创建一个mapper包&#xff0c;写一个UserMapper接口4. 创建一个service包&#xff0c;写一个UserService接口。5. 在 Service 包下创建一个子包&#xff0c;im…

CSS 的背景样式

1.1 背景颜色 1.2 背景图片 1.3 背景平铺 1.4 背景图片位置 1.4.1 方位名词 1.4.2 精确单位 1.4.3 混合单位 1.5 背景图像固定 1.6 背景复合写法 1.7 背景色半透明 1.8 总结

SpringCloud-07 GateWay01 网关技术

Spring Cloud Gateway组件的核心是一系列的过滤器&#xff0c;通过这些过滤器可以将客户端发送的请求转发(路由)到对应的微服务。 Spring Cloud Gateway是加在整个微服务最前沿的防火墙和代理器&#xff0c;隐藏微服务结点IP端口信息&#xff0c;从而加强安全保护。Spring Clou…