Frogy's Subdomain Enumeraton - It's not yet another Subdomain Enumeration tool

Using the combination of different subdomain tools it tries to identify more subdomains using combination of bruteforce and other techniques.

  • Requirements: Go Language, Python 3.+, jq

  • Tools used - You must need to install these tools and place them into /usr/bin folder to use this script

    • SubFinder - Ensure the binary name must be 'subfinder' only
    • Assetfinder - Ensure the binary name must be 'assetfinder' only
    • Find-domain - Ensure the binary name must be 'findomain-linux' only
    • httprobe - Ensure the binary name must be 'httprobe' only
    • anew - Ensure the binary name must be 'anew' only
    • massdns - Ensure the binary name must be 'massdns' only

    You might require to install WHOIS and JQ depending upon your enviroment. You can install them using the following commands:

     apt install jq
     apt install whois
    
  • Installation

    git clone https://github.com/iamthefrogy/frogy.git
    cd frogy
    chmod +x frogy.sh.x
    
  • Usage

    ./frogy.sh.x
    
  • Output

    Output will be saved within output/ORG/ORG.master file. 
    If telsa.com is your target then output file will be output/telsa/tesla.master
    

TODO

  • Efficient folder structure management
  • Resolving subdomains using Massdns
  • Add dnscan for extened subdomain enum scope
  • Add scope for extened subdomain enum scope
  • Eliminate false positives. Currently around 2% to 4% false positives are there.
  • Removed resolving part
  • Find live URLs on standard (80, 443) and non-standard ports (8080, 8443, 8888, etc.)

Thanks to the authors of the tools used in this script.

Warning: This is just a research project. Kindly use it with caution and at your own risk.

GitHub