Provided by: sublist3r_1.1-4_all
NAME
sublist3r - tool designed to enumerate subdomains of websites using OSINT
SYNOPSIS
sublist3r [ARGS] ...
DESCRIPTION
This package contains a Python security tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting over the network. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS. Subbrute was integrated with Sublist3r to increase the possibility of finding more subdomains using bruteforce with an improved wordlist.
OPTIONS
-h, --help Show this help message and exit -d DOMAIN, --domain DOMAIN Domain name to enumerate it's subdomains -b [BRUTEFORCE], --bruteforce [BRUTEFORCE] Enable the subbrute bruteforce module -p PORTS, --ports PORTS Scan the found subdomains against specified TCP ports -v [VERBOSE], --verbose [VERBOSE] Enable verbosity and display results in realtime -t THREADS, --threads THREADS Number of threads to use for subbrute bruteforce -e ENGINES, --engines ENGINES Specify a comma-separated list of search engines -o OUTPUT, --output OUTPUT Save the results to text file -n, --no-color Output without color
EXAMPLES
sublist3r -d google.com sublist3r -d example.com -p 80,443 sublist3r -v -d example.com sublist3r -b -d example.com sublist3r -e google,yahoo,virustotal -d example.com
AUTHOR
Written by Ahmed Aboul-Ela This manual page was written by Guilherme de Paula Xavier Segundo <guilherme.lnx@gmail.com> for the Debian project (but may be used by others).