https://github.com/session-x/subfuzzinator
SubFuzzinator is a recursive subdomain fuzzing tool built for security professionals and bug bounty hunters. It digs deep into multi-level subdomains using custom wordlists, filters live domains with httpx, and outputs results in a simple, efficient workflow. 🚀
https://github.com/session-x/subfuzzinator
bash-script bug-bounty cybersecurity domain-recon domain-research fuzzing-tools httpx pentesting recursive-fuzzing subdomain-enumeration subdomain-fuzzing
Last synced: 2 months ago
JSON representation
SubFuzzinator is a recursive subdomain fuzzing tool built for security professionals and bug bounty hunters. It digs deep into multi-level subdomains using custom wordlists, filters live domains with httpx, and outputs results in a simple, efficient workflow. 🚀
- Host: GitHub
- URL: https://github.com/session-x/subfuzzinator
- Owner: session-x
- License: mit
- Created: 2024-12-15T15:26:07.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-12-15T15:33:55.000Z (6 months ago)
- Last Synced: 2025-02-12T11:16:50.846Z (4 months ago)
- Topics: bash-script, bug-bounty, cybersecurity, domain-recon, domain-research, fuzzing-tools, httpx, pentesting, recursive-fuzzing, subdomain-enumeration, subdomain-fuzzing
- Language: Shell
- Homepage:
- Size: 12.7 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
```markdown
# SubFuzzinator 🚀SubFuzzinator is a powerful and recursive subdomain fuzzing tool designed to uncover deeply hidden subdomains and filter live domains effortlessly. Created with love by **Alvin**, this tool is perfect for security researchers, bug bounty hunters, and penetration testers.
---
## 🌟 Features
- **Recursive Subdomain Fuzzing**: Automatically fuzz multi-level subdomains using a customizable wordlist.
- **Live Subdomain Filtering**: Integrates with `httpx` to find live subdomains with ease.
- **Extensible and Lightweight**: Easily modify the script to suit your needs.---
## 🛠️ Installation
### Prerequisites
1. Install **SubFuzzinator** dependencies:
- [subfinder](https://github.com/projectdiscovery/subfinder)
- [httpx](https://github.com/projectdiscovery/httpx)Install them via `go`:
```bash
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
```2. Download the fuzzing wordlist (or use your own):
- Example wordlist: [SecLists](https://github.com/danielmiessler/SecLists/blob/master/Discovery/DNS/subdomains-top1million-5000.txt).---
### 🔧 Usage
1. Clone the repository:
```bash
git clone https://github.com/session-x/SubFuzzinator.git
cd SubFuzzinator
```2. Make the script executable:
```bash
chmod +x subfuzzinator.sh
```3. Run the tool:
```bash
./subfuzzinator.sh
```4. Provide the input domain when prompted, and let the tool do the magic! 🎩✨
---
## 📂 Output
- **subdomains.txt**: Initial subdomains discovered by `subfinder`.
- **fuzzed_subdomains.txt**: Generated subdomains using recursive fuzzing.
- **live_subdomains.txt**: Live subdomains filtered using `httpx`.---
## 🚀 Example
```bash
$ ./subfuzzinator.shEnter the domain to scan (e.g., google.com): example.com
Running subfinder on example.com...
Starting fuzzing process...
Running httpx to find live subdomains...
Found live subdomains:
- admin.example.com
- dev.api.example.com
- test.backend.example.com
```---
## 🧠 How It Works
1. **Subdomain Discovery**: Uses `subfinder` to identify initial subdomains of the target domain.
2. **Fuzzing**: Generates new subdomains by combining discovered subdomains with a fuzzing wordlist.
3. **Recursive Scanning**: Applies the same fuzzing logic recursively to each new subdomain.
4. **Live Subdomain Detection**: Filters the generated subdomains to find live hosts using `httpx`.---
## 📜 License
This project is licensed under the MIT License. Feel free to use, modify, and distribute it as you see fit.
---
## 🤝 Contributing
Contributions, issues, and feature requests are welcome! Feel free to open an issue or submit a pull request.
---
## 🌟 Acknowledgements
- [SubFinder](https://github.com/projectdiscovery/subfinder) for subdomain enumeration.
- [HTTPX](https://github.com/projectdiscovery/httpx) for live subdomain filtering.
- [SecLists](https://github.com/danielmiessler/SecLists) for wordlists.---
## 🔗 Connect with the Creator
- **linkdin**: [@alvin](https://www.linkedin.com/in/alvinbijo/)---