Bluto v-1.1.5 released : DNS recon | Brute forcer | DNS Zone Transfer.

Bluto v-1.1.5 released : DNS recon | Brute forcer | DNS Zone Transfer.

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will brute force subdomains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’. NetCraft results are presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

 Bluto is attempting to brute force the target domain.

Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Debian And Kali 2.0

Latest version v-1.1.5:
+ Cleaning of source, formating and output

Installation :
pip install git+git://github.com/RandomStorm/Bluto
Upgrade:
pip install git+git://github.com/RandomStorm/Bluto –upgrade

Download : v1.1.5.tar.gz  | v1.1.5.zip
Source: https://github.com/RandomStorm