Subdomain3 is a new generation of tool , It helps penetration testers to discover more information in a shorter time than other tools.The information includes subdomains, IP, CDN, and so on. Please enjoy it. Features More quick Three patterns for speed. User can modify the configuration(lib/config.py) file to speed-up. CDN support Determines whether the subdomain uses CDN storage automatically,even though the dict of CDN severs not contain the cname suffix. RFC CIDR Sorting ip and report CIDR(example 18.104.22.168/24) that it not use CDN storage; Multi-level subdomain support Discover more subdomains,example:admin.test.xx.com Big dict support Million of subs support Less resource consumption 1 CPU/1GB Memory/1Mbps bandwidth More intelligent Discover the fastest nameserver;The strategy of dynamically adjusting of dict by importing subdomains from other sources;Prevent dns cache pollution; Getting started git clone https://github.com/yanxiu0614/subdomain3.git pip install -r requirement.txt python2/3 brutedns.py -d tagetdomain -s high -l 5 Usage Short Form | Long Form | Description —|—|— -d | –domain | target domain,for example: baidu.com -s | –speed | speed,three patterns:fast,medium,low -l | –level | example: 2:w.baidu.com; 3:w.w.baidu.com; -f | –file | The list of target domain -c | –cname | n or y,collect cnames -ns | –default_dns | n or y -f1 | –sub_file | …
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-11-30 15:52:002019-11-30 15:52:00Subdomain3 - A New Generation Of Tool For Discovering Subdomains
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com