• We just launched and are currently in beta. Join us as we build and grow the community.

Sublist3r – Fastest Subdomain Enumeration Tool

JasonB0urne

Privilege Access Management Tester
J Rep
0
0
0
Rep
0
J Vouches
0
0
0
Vouches
0
Posts
77
Likes
154
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Black-and-Orange-Thin-Geometric-Lines-10-Slides-You-Need-By-Guy-Kawasaki-Pitch-Deck-Presentation.webp


Hey Folks, we will continue our research as we have been doing before and will continue to bring you the best tool so that you can reap the best rewards from companies. Similarly, today we come up with an amazing tool that can cut down your effort to find subdomains and deliver the best results possible.

Let’s Find out 🙂 !!

Dependencies Must be Installed

The tool is securely configured within the python language, so we need to install python and some related dependencies first before we can operate the tool.

apt install python3
apt install python3-pip12apt install python3apt install python3-pip

1.png

Sublist3r Tool Installation

Now coming to the second part of this tool, where we will first download the project from Github, go to the directory and download the required dependencies.

git clone https://github.com/aboul3la/Sublist3r.git
cd Sublist3r
pip install -r requirements.txt123git clone
https://github.com/aboul3la/Sublist3r.gitcd Sublist3rpip install-rrequirements.txt

2.png


Done :0 !! Everything is setup perfectly and now we can operate this tool directly through Python commands.

python3 sublist3r.py -h1python3 sublist3r.py-h

3.png

Find Subdomain

Finding subdomains through this tool is quite simple as all we have to do is enter the domain name and that’s it.

python3 sublist3r.py -d domain.com1python3 sublist3r.py-ddomain.com

4.png


Good 🙂 !! As you can see how easily it has dumped multiple subdomains with the help of brute forcing technique. It’s quite fast and accurate.

5.png

Specific Port

If you want to find the subdomain on which specific port like 80,444,21 etc is running then you can also mention that.

python3 sublist3r.py -d choint.com -p 80,4431python3 sublist3r.py-dchoint.com-p80,443

6.png

Save Output

There is also an option available to save all your output to any text file.

python3 sublist3r.py -d chargepoint.com -p 80,443 -o result.txt1python3 sublist3r.py-dchargepoint.com-p80,443-oresult.txt

7.png


Amazing 🙂 !! As you can see how your output will look when you open it through “cat” command.

8.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

422,212

310,551

310,560

Top