https://github.com/cergo123/dns-scavenger
A script to find expired and non-registered domains in the values of DNS records of other domains
https://github.com/cergo123/dns-scavenger
dns dnssec domain-security network-security penetration-testing phishing python security security-audit security-automation
Last synced: 8 months ago
JSON representation
A script to find expired and non-registered domains in the values of DNS records of other domains
- Host: GitHub
- URL: https://github.com/cergo123/dns-scavenger
- Owner: cergo123
- License: apache-2.0
- Created: 2024-08-02T13:42:43.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-08-02T13:47:01.000Z (about 1 year ago)
- Last Synced: 2024-12-30T09:19:32.147Z (10 months ago)
- Topics: dns, dnssec, domain-security, network-security, penetration-testing, phishing, python, security, security-audit, security-automation
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
## DNS Scavenger
### Expired domains in DNS records finder
This script will find expired domains (not registered) in DNS records, it takes a list of domains and search in all its `MX`, `NS`, `SOA`, `TXT`, `CNAME`, `SRV`, `PTR` records for other domains and then check if these domains are available or not.### Usage
```bash
$ python3 -m venv venv
$ source venv/bin/activate
$ pip install -r requirements.txt
# add your domains in `domains.txt` file
$ python3 search.py
```### Why this could be useful?
This could be useful for finding expired domains that are still being used in DNS records, so for example if there are old forgetten domains in `MX` records could be misused by attackers to send phishing emails, so it is better to find them and fix these records.### False Positives
There could be false positives that comes usually from the `whois` so it is better to check manually if the found domain is registered or not.