https://github.com/Evil-Twins-X/SubEvil
SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.
https://github.com/Evil-Twins-X/SubEvil
bugbounty domain-enumeration enumeration-tool osint pentesting recon redteaming subdomain-enumeration subdomain-recon threatminer tls-bufferover urlscan-api virustotal-api virustotal-search whoisxmlapi
Last synced: 2 months ago
JSON representation
SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.
- Host: GitHub
- URL: https://github.com/Evil-Twins-X/SubEvil
- Owner: Evil-Twins-X
- Created: 2022-06-18T03:25:05.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-09-29T18:40:10.000Z (over 2 years ago)
- Last Synced: 2023-03-04T22:41:08.649Z (about 2 years ago)
- Topics: bugbounty, domain-enumeration, enumeration-tool, osint, pentesting, recon, redteaming, subdomain-enumeration, subdomain-recon, threatminer, tls-bufferover, urlscan-api, virustotal-api, virustotal-search, whoisxmlapi
- Language: Python
- Homepage:
- Size: 2.03 MB
- Stars: 74
- Watchers: 4
- Forks: 12
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
### (SubEvil)--> Subdomain Enumeration (❗❗Please update the tool every Saturday❗❗)
┌──(evil-word㉿Evil-Word)-[~/Desktop/MyProcejt/Python/SubEvil]
└─$ python3 SubEvil.py -h███████╗██╗ ██╗██████╗ ███████╗██╗ ██╗██╗██╗
██╔════╝██║ ██║██╔══██╗██╔════╝██║ ██║██║██║
███████╗██║ ██║██████╔╝█████╗ ██║ ██║██║██║
╚════██║██║ ██║██╔══██╗██╔══╝ ╚██╗ ██╔╝██║██║
███████║╚██████╔╝██████╔╝███████╗ ╚████╔╝ ██║███████╗
╚══════╝ ╚═════╝ ╚═════╝ ╚══════╝ ╚═══╝ ╚═╝╚══════╝
#=====================================================#
# Tool Version : V2.1.1 #
# Programmer : EvilTwins #
# Facebook : @evi1.twins #
# Github : @Evil-Twins-X #
#=====================================================#usage: SubEvil.py [-h] [--domains DOMAINS] [--port-scan PORT_SCAN] [--random-agent] [--version] [--http-only] [--https-only]
[--status-code STATUS_CODE] [--title] [--update]
options:
-h, --help show this help message and exit
--domains DOMAINS, -d DOMAINS
Domain name to enumerate it's subdomains
--port-scan PORT_SCAN, -p PORT_SCAN
Scan Port Open Ex.. --port-scan 80,443,21,8080,8443
--random-agent, -ra Use randomly selected HTTP User-Agent header value
--version, -v Show program's version number and exit
--http-only, -http Test Domains Ony HTTP
--https-only, -https Test Domains Ony HTTPS
--status-code STATUS_CODE, -sc STATUS_CODE
display response status-code --status-code All or 200 or 404 or 303 etc..
--title, -t display page title
--update update SubEvil [Please update the tool every Saturday]
### SubEvil
It is a tool programmed in Python language to detect multiple subdomains of a website### From Where does the SubEvil collect subdomains
alienvault
anubis
binaryedge
censys
certspotter
crt
dns_bufferover
dnsdb
hackertarget
omnisint
passivetotal
recondev
riddler
securitytrails
shodan
spyse
sublist3r
threatcrowd
threatminer
tls_bufferover
urlscan
virustotal
whoisxmlapi
> # install SubEvil
> git clone https://github.com/Evil-Twins-X/SubEvil.git && pip3 install colored && pip3 install requests# argparse
| Short Form | Form | Description |
| ------------- | ------------- |--------|
|-d|--domains|Domain name to enumerate it's subdomains|
| -p|--port-scan|Scan Port Open Ex.. --port-scan 80,443,21,8080,8443|
|-ra |--random-agent |Use randomly selected HTTP User-Agent header value|
|-v |--version|Show program's version number and exit|
|-http|--http-only|Test Domains Ony HTTP #Updata V1.1.2|
|-https |--https-only |Test Domains Ony HTTPS #Updata V1.1.2|
|-sc |--status-code|display response status-code --status-code All or 200 or 404 or 303 etc.. #Updata V1.1.2|
|-t|--title|display page title #Updata V1.1.2|
|-up|--update|update SubEvil [Please update the tool every Saturday]
# Usage
`Python3 SubEvil.py -d facebook.com -ra`
## ًWaiting for completion

## End
# How can I add the value of the API?
> Go to Lib Open Confger.py Add Api Value Here
https://developer.shodan.io/api/requirements
https://whois.whoisxmlapi.com/documentation/generate-new-api-key
https://sslmate.com/certspotter/
https://www.farsightsecurity.com/trial-api/
https://virustotal.com/
https://recon.dev
https://api.riskiq.net/api/pt_started.html
https://censys.io/
https://developers.facebook.com/docs/facebook-login/guides/access-tokens
https://app.binaryedge.io/
https://spyse.com
https://securitytrails.com# Update SubEvil
> python3 SubEvil.py --update
## after Update

## show version
> python3 SubEvil.py -v
# ✅🔨Update {2020-7-24}🔨✅
┌──(root㉿Evil-Word)-[/home/…/Python/SubEvil/update/V1.1.1]└─# python3 SubEvil.py --update

┌──(root㉿Evil-Word)-[/home/…/Python/SubEvil/update/V1.1.1]
└─# python3 SubEvil.py -v

┌──(root㉿Evil-Word)-[/home/…/Python/SubEvil/update/V1.1.1]
└─# python3 SubEvil.py -h # Or --help

# After Update ➕➕ argparse ➕➕
| Short Form | Form | Description |
| ------------- | ------------- |--------|
| -http|--http-only|Test Domains Ony HTTP|
|-https |--https-only |Test Domains Ony HTTPS|
|-sc |--status-code|display response status-code --status-code All or 200 or 404 or 303 etc..|
|-t|--title|display page title]|# Usage
> python3 SubEvil.py --domain facebook.com --random-agent --http-only

> python3 SubEvil.py --domain facebook.com --random-agent --https-only

> python3 SubEvil.py --domain facebook.com --random-agent --https-only --status-code 200

> python3 SubEvil.py --domain facebook.com --random-agent --https-only --status-code 400,403,404

> python3 SubEvil.py --domain facebook.com --random-agent --https-only --status-code all #or All

> python3 SubEvil.py --domain facebook.com --random-agent --https-only --title

> python3 SubEvil.py --domain facebook.com --random-agent --https-only --title --status-code All

# ✅🔨Update {2023-7-31}🔨✅
┌──(root㉿Evil-Word)-[/home/…/Python/SubEvil/update/V1.1.1]└─# python3 SubEvil.py --update
# After Update ➕➕ argparse ➕➕
| Short Form | Form | Description |
| ------------- | ------------- |--------|
| -p|--port-scan|Scan Port Open Ex.. --port-scan 80,443,21,8080,8443|# Usage
> python3 SubEvil.py --domain facebook.com --random-agent --port-scan 80,443,8080,21,53

Telegram
[Evil_Twins_X](https://t.me/Evil_Twins_X)
Facebook:[Evil.Twins](https://www.facebook.com/PS0Xx)