Skip to content

SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty

License

Notifications You must be signed in to change notification settings

asloma1984/Subdominator

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Subdominator - Unleash the Power of Subdomain Enumeration

Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential security vulnerabilities by efficiently enumerating subdomains some various free passive resources.

GitHub last commit GitHub release (latest by date) GitHub license LinkedIn

Features:


  • fast and powerfull to enumerate subdomains.
  • 35+ passive results to enumerate subdomains.
  • configurable API keys setup
  • Integrated notification system

Usage:

subdominator -h
                    __         __                       _                    __                
   _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____
  / ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/
 (__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    
/____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     
                                                                                               

                     @RevoltSecurities


          
[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources

[USAGE]: 

    subdominator [flags]
    
[FLAGS]: 

    [INPUT]: 
    
        -d,   --domain                  :  domain name to enumerate subdomains.
        -dL,  --domain-list             :  filename that contains domains for subdomain enumeration.
        stdout                          :  subdominator supports stdout to pipe its output
        
    [OUTPUT]: 
    
        -o,   --output                  :  filename to save the outputs.
        -oD,  --output-directory        :  directory name to save the outputs (use it when -dL is flag used).
        
    [OPTIMIZATION]: 
    
        -t,   --timeout                 : timeout value for every sources requests. 
    
    [Update]: 
    
        -up,   --update                 :  update subdominator for latest version but yaml source update required manual to not affect your api keys configurations.
        -duc, --disable-update-check    :  disable automatic update check for subdominator
        -sup, --show-updates            :  shows latest version updates of subdominator 
        
    [CONFIG]: 
    
        -nt,  --notify              :  send notification of found subdomain using source Slack, Pushbullet, Telegram, Discord
        -p,   --proxy               :  http proxy to use with subdominator (intended for debugging the performance of subdominator).
        -cp,  --config-path         :  custom path of config file for subdominator to read api keys ( default path: /home/sanjai/.config/Subdominator/provider-config.yaml)
        
    [DEBUG]: 
    
        -h,   --help                :  displays this help message and exits 
        -v,   --version             :  show current version of subdominator and latest version if available and exits
        -ske, --show-key-error      :  show keys error for out of credits and key not provided for particular sources
        -sre, --show-timeout-error  :  show timeout error for sources that are timeout to connect
        -nc,  --no-color            :  disable the colorised output of subdominator
        -ls,  --list-source         :  display the sources of subdominator uses for subdomain enumerations and exits (included for upcoming updates on sources).

Subdominator Integrations:

Subdominator integrates with various free API passive sources to gather valuable subdomain information. We would like to give credit to the following websites for providing free-to-obtain API keys for subdomain enumeration. Claim your free API keys here: Subdomains Resources:

Notification Resources:

Installation:

**Subdominator requires python latest version to be installed and with latest version pip commandline tool

pip install git+https://github.com/RevoltSecurities/Subdominator

Post Installation setup:

subdominator can be used after installing successfully but if you want to use subdominator efficiently with its maximum level then some source requires API keys to setup and users can use this command:

subdominator -ls
                    __         __                       _                    __                
   _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____
  / ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/
 (__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    
/____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     
                                                                                               

                     @RevoltSecurities

[Version]: Subdominator current version v1.0.7 (latest)
[INFO]: Current Available free passive resources: [39]
[INFO]: Sources marked with an * needs API key(s) or token(s) configuration to works
[INFO]: Hey sanjai you can config your api keys or token here /home/sanjai/.config/Subdominator/provider-config.yaml to work
abuseipDB                                                                                                                                                                                                                                     
alienvault                                                                                                                                                                                                                                    
anubis                                                                                                                                                                                                                                        
bevigil*                                                                                                                                                                                                                                      
binaryedge*                                                                                                                                                                                                                                   
bufferover*                                                                                                                                                                                                                                   
censys*                                                                                                                                                                                                                                       
certspotter*                                                                                                                                                                                                                                  
chaos*                                                                                                                                                                                                                                        
columbusapi                                                                                                                                                                                                                                   
crtsh                                                                                                                                                                                                                                         
digitorus                                                                                                                                                                                                                                     
dnsdumpster*                                                                                                                                                                                                                                  
dnsrepo                                                                                                                                                                                                                                       
facebook*                                                                                                                                                                                                                                     
fullhunt*                                                                                                                                                                                                                                     
google*                                                                                                                                                                                                                                       
hackertarget                                                                                                                                                                                                                                  
huntermap*                                                                                                                                                                                                                                    
intelx*                                                                                                                                                                                                                                       
leakix*                                                                                                                                                                                                                                       
netlas*                                                                                                                                                                                                                                       
quake*                                                                                                                                                                                                                                        
rapidapi*                                                                                                                                                                                                                                     
rapiddns                                                                                                                                                                                                                                      
redhuntlabs*                                                                                                                                                                                                                                  
securitytrails*                                                                                                                                                                                                                               
shodan*                                                                                                                                                                                                                                       
shodanx                                                                                                                                                                                                                                       
shrewdeye                                                                                                                                                                                                                                     
sitedossier                                                                                                                                                                                                                                   
subdomaincenter                                                                                                                                                                                                                               
urlscan                                                                                                                                                                                                                                       
virustotal*                                                                                                                                                                                                                                   
waybackarchive                                                                                                                                                                                                                                
whoisxml*                                                                                                                                                                                                                                     
zoomeyeapi*                                                                                                                                                                                                                                   
rapidfinder*: Rapidfinder requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/Glavier/api/subdomain-finder3/pricing                                                              
rapidscan*  : Rapidscan requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/sedrakpc/api/subdomain-scan1/pricing       

here above we can see subdominator resources it uses and resource marked with an (*) need API keys to work and users can collect API keys from those websites and hyperlink will provided for sources when using command subdominator -ls every source link provided as a hyperlink so place your cursor on sources will show the hyperlink on your terminal

Keys configurations:

so we saw what are the resources are available for subdominator so now where to paste keys? it easy just see in your ~/$HOME/.config/Subdominator/provider-config.yaml and all sourcess are available there, now paste your API keys and One more thing Subdominator follow same keys setup syntax of subfinder and you refer https://docs.projectdiscovery.io/tools/subfinder/install#post-install-configuration but before refering there is only one difference is for zoomeyeapi in subdominator which in subfinder you need to give both host and key ex:

zoomeyeapi:
   - zoomeye.hk:AudbAfjHslif_sudf

but in subdominator you should give only api keys not host for ex:

zooeyeapi:
   - AudbAfjHslif_sudf

Now lets come to other resources setup that varies from subfinder:

  • Dnsdumpter Setup:

    *Dnsdumpster requires csrf token and cookie to obtain it visit Dnsdumpter: Dnsdumpster Search any domain and Intercept the requests your burp that contains token and cookie. Copy that and paste in your yaml file


  • Google Setup:

    • Step 1: First login a google account in your browser
    • Step 2: Visit here and create a search engine and choose all web option like below mentioned in images


    - Step 3: After Creating your successfull search engine it time to copy your cx id - Step 4: After completing these all process now its time to grab your api keys of google [here](https://developers.google.com/custom-search/v1/introduction) - Step 5: Press the get key button and create a new project with any name you want and click next - Step 6: After creating and completing your api key is generated and press show key then copy it - Step 7: Now its time to paste your google cx id and API key in yaml file
google
  #cxID:Apikey
  - 23892479:AIdjhakbkdiudgiao

So you configured this different resources of subdominator, now follow the other steps to setting up API keys which I mentioned before here https://github.com/RevoltSecurities/Subdominator/edit/main/README.md#keys-configurations Now After setting up your api keys your provider yaml file looks like

censys: 
  - 9f5a-be11-4b9e-9564-9596e78:Va92kyMYPS7ANKpI8CjV

facebook:
  - 1550699734936481:3b2eff7304659559380ad88d8c4b82f

google:
   - 34992b4aee9494e7b:AIzaSyCcEqqOERofbkudEY_iVC2_Wfv0A

intelx:
  - 2.intelx.io:1995e804-3c71-4938042-8042802-efa29ae2964d

zoomeyeapi:
   - 3833802-b9FF-6E1A5-7d2d-9792d64082adf
   - 6F28942CC-ACA5-573E8-d769-99b4c728042d

redhuntlabs: 
  - https://reconapi.redhuntlabs.com/community/v1/domains/subdomains:VRp7HK3jWiRSnpPfois7979spn4tvDVi0vM

dnsdumpster:
  - zsdqYb0rvIVYh2uPHo5Yk4EljV9GEKn44hDL9V2DFXznflW37Q5pZl8pvQHUHWav:Z488EzyPXVwDAhDGlm8gTBvkubRfLyBxuTytPjA17aa2yA5ULO8HySZoG6ptOKoY

Booyah ⚡ completed , now you can run subdominator with its maxiumum and wait for 2-4 minutes then you will have your results.

Security:

Subdominator is a promising tool that will never cause any threats to users or security researcher and its safe to use. Even without Users permissions subdominator will not update itself and I welcome everyone who are intrested contribute for Subdominator can create their issues and report it.

License:

Subdominator is built by RevoltSecurities Team with ❤️ and your support will encourage us to improve the subdominator more and Community contributors are Welcome to contribute for subdominator and If you love the subdominator support it by giving a ⭐ .

About

SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%