Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mrcl0wnlab/simplereconsubdomain
This is very basic automated recon script tool.
https://github.com/mrcl0wnlab/simplereconsubdomain
bugbounty hacking hacking-tool python recon
Last synced: about 2 months ago
JSON representation
This is very basic automated recon script tool.
- Host: GitHub
- URL: https://github.com/mrcl0wnlab/simplereconsubdomain
- Owner: MrCl0wnLab
- License: apache-2.0
- Created: 2020-08-27T19:58:56.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-07-14T13:27:06.000Z (7 months ago)
- Last Synced: 2024-07-14T15:10:43.195Z (7 months ago)
- Topics: bugbounty, hacking, hacking-tool, python, recon
- Language: Python
- Homepage:
- Size: 1.23 MB
- Stars: 20
- Watchers: 2
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SimpleReconSubdomain
This is very basic automated recon script tool.[![Python 3.7](https://img.shields.io/badge/python-3.7-yellow.svg)](https://www.python.org/)
[![Build](https://img.shields.io/badge/Supported_OS-Linux-orange.svg)]()
[![Build](https://img.shields.io/badge/Supported_OS-Mac-orange.svg)]()
![GitHub](https://img.shields.io/github/license/MrCl0wnLab/SenderMailgunPython?color=blue)
```
Autor: MrCl0wn
Blog: http://blog.mrcl0wn.com
GitHub: https://github.com/MrCl0wnLab
Twitter: https://twitter.com/MrCl0wnLab
Email: mrcl0wnlab\@\gmail.com
```
## USE
```
python tool.py {domain}
python tool.py fbi.gov
```
![Screenshot](assets/img1.png)
![Screenshot](assets/img2.png)
## TARGET IS A MAGIC STRING
```bash
curl -s "https://rapiddns.io/subdomain/TARGET?full=1#result" | awk -v RS='<[^>]+>' '/$1/' | sort -u >>TARGET-rapiddns.txtcurl -s "https://rapiddns.io/subdomain/TARGET?full=1#result" | awk -v RS='<[^>]+>' '/$1/' | sort -u >>TARGET-rapiddns.txt
curl -s "https://riddler.io/search/exportcsv?q=pld:TARGET" | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u >>TARGET-riddler.txt
curl -s "https://jldc.me/anubis/subdomains/TARGET" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u >>TARGET-jldc.txt
curl -s "https://crt.sh/?q=%25.TARGET&output=json" | jq -r '.[].name_value' | sed 's/\*\.//g' | sort -u >>TARGET-crt.txt
curl -s "https://dns.bufferover.run/dns?q=.TARGET" | jq -r .FDNS_A[] | sed -s 's/,/\\n/g' | sort -u >>TARGET-bufferover.txt
curl -s "https://urlscan.io/domain/TARGET" | grep "/domain" | grep TARGET | grep -v "" -f1 | sed 's/"//g' | sort -u >>TARGET-urlscan.txt
cat TARGET-*.txt | sort -u >TARGET.txt;cat TARGET.txt -n
```
## OUTPUT
```
TARGET-rapiddns.txt
TARGET-riddler.txt
TARGET-jldc.txt
TARGET-crt.txt
TARGET-bufferover.txt
TARGET-urlscan.txt
```
## OUTPUT SORT UNIQ
```
TARGET.txt
```
### Th4nk Y0u
```
@ofjaaah
```