当前位置: 首页 > news >正文

Subdominator:一款针对漏洞奖励计划的子域名安全枚举工具

关于Subdominator

Subdominator是一款针对漏洞奖励计划的子域名安全枚举工具,可用于在漏洞搜寻和侦察过程中进行被动子域名枚举。它旨在通过高效枚举子域名和各种免费被动资源来帮助研究人员和网络安全专业人员发现潜在的安全漏洞。

Subdominator 与各种免费和付费 API 被动源集成,以收集有价值的子域信息。

功能介绍

1、能够快速、强大地子域名枚举能力;

2、45+ 被动结果枚举子域;

3、可配置 API 密钥设置;

4、综合通知系统;

工具要求

aiofiles>=23.2.1

aiohttp>=3.9.4

appdirs>=1.4.4

art>=6.1

beautifulsoup4>=4.11.1

colorama>=0.4.6

fake_useragent>=1.5.0

PyYAML>=6.0.1

Requests>=2.31.0

rich>=13.7.1

urllib3>=1.26.18

工具安装

由于该工具基于Python 3开发,因此我们首先需要在本地设备上安装并配置好最新版本的Python 3环境。

接下来,广大研究人员可以直接使用下列命令将该项目源码克隆至本地:

git clone https://github.com/RevoltSecurities/Subdominator.git

然后切换到项目目录中,使用pip命令和项目提供的requirements.txt安装该工具所需的其他依赖组件:

cd Subdominatorpip install -r requirements.txt

或直接使用pip命令行工具安装最新版本的Subdominator:

pip install git+https://github.com/RevoltSecurities/Subdominator

Subdominator安装成功后即可使用,但如果想以最高级别高效地使用 subdominator,则某些源需要 API 密钥来设置,用户可以使用此命令:

subdominator -ls
__         __                       _                    __                _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____/ ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/(__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    /____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     @RevoltSecurities[Version]: Subdominator current version v1.0.8 (latest)[INFO]: Current Available free passive resources: [45][INFO]: Sources marked with an * needs API key(s) or token(s) configuration to works[INFO]: Hey sanjai you can config your api keys or token here /home/sanjai/.config/Subdominator/provider-config.yaml to workabuseipDB                                                                                                                                                                                                                                     alienvault                                                                                                                                                                                                                                    anubis                                                                                                                                                                                                                                        bevigil*                                                                                                                                                                                                                                      binaryedge*                                                                                                                                                                                                                                   bufferover*                                                                                                                                                                                                                                   c99*                                                                                                                                                                                                                                          censys*                                                                                                                                                                                                                                       certspotter*                                                                                                                                                                                                                                  chaos*                                                                                                                                                                                                                                        columbusapi                                                                                                                                                                                                                                   crtsh                                                                                                                                                                                                                                         digitorus                                                                                                                                                                                                                                     dnsdumpster*                                                                                                                                                                                                                                  dnsrepo                                                                                                                                                                                                                                       fofa*                                                                                                                                                                                                                                         facebook*                                                                                                                                                                                                                                     fullhunt*                                                                                                                                                                                                                                     google*                                                                                                                                                                                                                                       hackertarget                                                                                                                                                                                                                                  huntermap*                                                                                                                                                                                                                                    intelx*                                                                                                                                                                                                                                       leakix*                                                                                                                                                                                                                                       myssl                                                                                                                                                                                                                                         netlas*                                                                                                                                                                                                                                       quake*                                                                                                                                                                                                                                        racent                                                                                                                                                                                                                                        rapidapi*                                                                                                                                                                                                                                     rapiddns                                                                                                                                                                                                                                      redhuntlabs*                                                                                                                                                                                                                                  rsecloud*                                                                                                                                                                                                                                     securitytrails*                                                                                                                                                                                                                               shodan*                                                                                                                                                                                                                                       shodanx                                                                                                                                                                                                                                       shrewdeye                                                                                                                                                                                                                                     sitedossier                                                                                                                                                                                                                                   subdomaincenter                                                                                                                                                                                                                               urlscan                                                                                                                                                                                                                                       virustotal*                                                                                                                                                                                                                                   waybackarchive                                                                                                                                                                                                                                whoisxml*                                                                                                                                                                                                                                     zoomeyeapi*                                                                                                                                                                                                                                   rapidfinder*: Rapidfinder requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/Glavier/api/subdomain-finder3/pricing                                                              rapidscan*: Rapidscan requires rapidapi api key but before it required to subscribe for free and please see here: https://rapidapi.com/sedrakpc/api/subdomain-scan1/pricing                                                                   coderog*: Coderog source required to subscribe for free and please see here: https://rapidapi.com/coderog-coderog-default/api/subdomain-finder5/pricing   

工具使用

subdominator -h
__         __                       _                    __                _____  __  __   / /_   ____/ /  ____    ____ ___    (_)   ____   ____ _  / /_  ____    _____/ ___/ / / / /  / __ \ / __  /  / __ \  / __ `__ \  / /   / __ \ / __ `/ / __/ / __ \  / ___/(__  ) / /_/ /  / /_/ // /_/ /  / /_/ / / / / / / / / /   / / / // /_/ / / /_  / /_/ / / /    /____/  \__,_/  /_.___/ \__,_/   \____/ /_/ /_/ /_/ /_/   /_/ /_/ \__,_/  \__/  \____/ /_/     @RevoltSecurities[DESCRIPTION]: Subdominator a passive subdomain enumeration that discovers subdomains for your targets using with passive and open source resources[USAGE]:subdominator [flags][FLAGS]:[INPUT]:-d,--domain:枚举子域的域名;-dL,--domain-list:包含用于枚举子域的域的文件名;stdout:子域支持 stdout 以将其输出通过管道传输;[OUTPUT]:-o,--output:用于保存输出的文件名;-oD,--output-directory:用于保存输出的目录名(使用 -dL 标志时使用它);[OPTIMIZATION]:-t,--timeout:每个源请求的超时值。    [Update]:-up,--update:更新子域以获取最新版本,但 yaml 源更新需要手动操作,以免影响您的 api 密钥配置;-duc, --disable-update-check :禁用 subdominator 的自动更新检查;-sup, --show-updates :显示 subdominator 的最新版本更新;[CONFIG]:-nt, --notify :使用源 Slack、Pushbullet、Telegram、Discord 发送发现子域的通知;-p, --proxy :与 subdominator 一起使用的 http 代理(用于调试 subdominator 的性能);-cp, --config-path :subdominator 读取 api 密钥的配置文件的自定义路径(默认路径:/home/sanjai/.config/Subdominator/provider-config.yaml);        [DEBUG]:-h, --help :显示此帮助消息并退出;-v, --version :显示 subdominator 的当前版本和最新版本(如果可用)并退出;-ske, --show-key-error :显示特定来源的信用不足和未提供密钥的密钥错误;-sre, --show-timeout-error :显示连接超时的来源的超时错误;-nc, --no-color :禁用 subdominator 的彩色输出;-ls, --list-source :显示 subdominator 用于子域枚举和退出的来源;

工具运行截图

许可证协议

本项目的开发与发布遵循MIT开源许可协议。

项目地址

Subdominator:【GitHub传送门】

参考资料

Installing Subfinder - ProjectDiscovery Documentation

DNSDumpster.com - dns recon and research, find and lookup dns records

https://programmablesearchengine.google.com/controlpanel/create

https://developers.google.com/custom-search/v1/introduction

相关文章:

  • SD2.0 Specification之功能切换
  • 【Diffusion分割】FDiff-Fusion:基于模糊学习的去噪扩散融合网络
  • 群晖套娃:群晖+飞牛fnOS二合一,群晖nas安装飞牛fnOS系统实录(飞牛fnOS初体验,如何挂载网盘视频,轻松实现影视刮削)
  • gtk4学习
  • SPI驱动学习七(SPI_Slave_Mode驱动程序框架)
  • AI驱动的Java开发框架:Spring AI Alibaba实战部署教程
  • C++之STL—常用排序算法
  • TDSQL-C电商可视化,重塑电商决策新纪元
  • IoT网关的主要功能有哪些?天拓四方
  • Hive优化高频面试题
  • Centos Stream 9根目录扩容
  • 【MySQL】函数及存储过程
  • GUI-工具栏(页签)和选择网格
  • leetcode621. 任务调度器
  • C++【类和对象】(构造函数与析构函数)
  • Android 架构优化~MVP 架构改造
  • Flex布局到底解决了什么问题
  • JSONP原理
  • JS创建对象模式及其对象原型链探究(一):Object模式
  • PHP 小技巧
  • PHP那些事儿
  • scrapy学习之路4(itemloder的使用)
  • Shadow DOM 内部构造及如何构建独立组件
  • SpringCloud(第 039 篇)链接Mysql数据库,通过JpaRepository编写数据库访问
  • Swift 中的尾递归和蹦床
  • Terraform入门 - 1. 安装Terraform
  • ViewService——一种保证客户端与服务端同步的方法
  • Vue UI框架库开发介绍
  • vue+element后台管理系统,从后端获取路由表,并正常渲染
  • 算法---两个栈实现一个队列
  • 新手搭建网站的主要流程
  • 说说我为什么看好Spring Cloud Alibaba
  • ​Benvista PhotoZoom Pro 9.0.4新功能介绍
  • ​HTTP与HTTPS:网络通信的安全卫士
  • ​力扣解法汇总946-验证栈序列
  • ### Error querying database. Cause: com.mysql.jdbc.exceptions.jdbc4.CommunicationsException
  • #QT(串口助手-界面)
  • #vue3 实现前端下载excel文件模板功能
  • (1)Android开发优化---------UI优化
  • (4)事件处理——(6)给.ready()回调函数传递一个参数(Passing an argument to the .ready() callback)...
  • (C语言)深入理解指针2之野指针与传值与传址与assert断言
  • (javaweb)Http协议
  • (ros//EnvironmentVariables)ros环境变量
  • (ZT) 理解系统底层的概念是多么重要(by趋势科技邹飞)
  • (附源码)ssm高校志愿者服务系统 毕业设计 011648
  • (附源码)计算机毕业设计ssm-Java网名推荐系统
  • (七)Activiti-modeler中文支持
  • (亲测有效)推荐2024最新的免费漫画软件app,无广告,聚合全网资源!
  • (十二)Flink Table API
  • (学习日记)2024.02.29:UCOSIII第二节
  • (转)mysql使用Navicat 导出和导入数据库
  • (转)ObjectiveC 深浅拷贝学习
  • (转)我也是一只IT小小鸟
  • .desktop 桌面快捷_Linux桌面环境那么多,这几款优秀的任你选
  • .equal()和==的区别 怎样判断字符串为空问题: Illegal invoke-super to void nio.file.AccessDeniedException