Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

https://github.com/rix4uni/SubDog

subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains
https://github.com/rix4uni/SubDog

recon reconnaissance subdomain subdomain-enumeration wayback-machine

Last synced: about 1 month ago
JSON representation

subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains

Lists

README

        

# Description
**SubDog collect number of different sources to create a list of root subdomains (i.e.: corp.example.com)**

# Prerequisite
> **Note**: before installing SubDog, make sure to install `Go Language`
```
curl -s "https://gist.githubusercontent.com/rix4uni/c412ca956ea3bfa114bf4b615a9762bc/raw/ae999f308cbd9be03f068762cb037343b51a40ce/go.sh" | bash && source ~/.bashrc
```

# Installation

```
git clone https://github.com/rix4uni/SubDog.git && cd SubDog && chmod +x install.sh subdog && ./install.sh && cd .. && mv SubDog ~/bin && source ~/.bashrc
```

# Example Usages

Single URL:
```
subdog -d example.com
```

Multiple URLs:
```
subdog -l wildcards.txt
```

# Usage
```
___ __ __ ____ ____ _____ ___
/ __)( )( )( _ \( _ \( _ )/ __)
\__ \ )(__)( ) _ < )(_) ))(_)(( (_-.
(___/(______)(____/(____/(_____)\___/
SubDog v1.1 coded by @rix4uni in INDIA
TARGET OPTIONS
-d, --domain Single Target domain (domain.com)
-l, --list Multiple Target domain (wildcards.txt)
--org Get ASN using orgname (dell)
--asn Get CIDR Range using ASN (AS59915)
--cidr_domain Get CIDR Range using domain (domain.com)
--reverse_domain Get Reverse Whois Subdomain using domain (domain.com)
-h, --help Help - Show this help

USAGE EXAMPLES
subdog -d example.com
subdog -l wildcards.txt
```

### Sources
- [rapiddns](https://rapiddns.io)
- [threatminer](https://api.threatminer.org)
- [riddler](https://riddler.io)
- [alienvault](https://otx.alienvault.com)
- [WayBackMachine](http://web.archive.org)
- [hackertarget](https://api.hackertarget.com)
- [crt.sh](https://crt.sh)
- [jldc.me](https://jldc.me)
- [urlscan](https://urlscan.io)
- [subdomainfinder](https://subdomainfinder.c99.nl)