• XReactor Team Telegram Channel!
    Our OLD TELEGRAM CHANNEL DELETED , Join now to get many free checkers, Click Here!
    XReactor Team Telegram Group, Join Now

Hacking  Thread Name: Active Subdomain Discovery with DNS Brute Force

Tess

Trials
  • Username: Tess
  • Threads: 8
  • Posts: 9
  • Likes: 153
State
Threads
8
Posts
9
Likes
153
Reputation
+3
Points
80
Credits
+60
Joined
This tool accurately uses both static and dynamic modes for subdomain brute forcing and stores it in its database (optional).

  • Static
  • Dynamic
    • Single subdomain
    • List of subdomains
  • Data Storage
    • MongoDB
Requirement
Installation
Code:
Download The file and extract it
pip install -r requirements.txt
cat script.txt >> ~/.zshrc OR cat script.txt >> ~/.bashrc
source ~/.zshrc OR source ~/.bashrc
Uasge
1. Static Brute Force
  • Command:
    • Bash:
      python3 main.py --mode static -w words.txt -d target.com --path-massdns /usr/bin/massdns -r ~/resolvers
2. Dynamic Brute Force
  • On the list of subdomains:
    • Bash:
      python3 main.py --mode dynamic --list-subs target-subs.txt -w words-merged.txt -d target.com -pm /usr/bin/massdns -r ~/resolvers
  • On the single subdomain:
    • Bash:
      python3 main.py --mode dynamic -w words-merged.txt -d api.target.com -pm /usr/bin/massdns -r ~/resolvers
Data Storage
This tool uses MongoDB database for data storage
  • Switch --insert Stored data:
    • Subdomain
    • Data added
    • Mode
Get List of Subdomains
  • Filter by mode:
    • Bash:
      python3 main.py --get -d target.com -m static
  • Without filtering:
    • Bash:
      python3 main.py -g -d target.com
Download:


369689450-805ca667-9106-4d00-bc68-8ce8c2b3f1cf.png
 
Before replying a post ! Here at xreactor.org, we require high quality posts, so dont send short messages like "cool", "thanks", "lol", "ewqopdjks" or etc, otherwise you will be banned.