SubEnum

Day 0 [1 Jan 2022]

Basic python based subdomain bruteforce tool, part of Python for cybersecurity project.

Requirements

pip3 install requests

Usage

usage: subenum.py -d <target.com> [options]

optional arguments:
  -h , --help       Show usage and help options
  -d , --domain     Target domain
  -w , --wordlist   Path to wordlist to bruteforce
  -o , --output     Filename to save. (Default: <subdomain>.txt)
  --about           Print about information

Linux:

python3 subenum.py -d example.com -w subdomain.txt

Windows:

python subenum.py -d example.com -w subdomain.txt

By default output will be saved as example-com.txt

Screenshots

usage

test

about

Feel free to open and issue if you face bugs or errors in this tool.

To do list

  • Threading.
  • Logging.

Twitter 0xRyuk

Credits : subdomain.txt list from SecLists

GitHub

View Github