Bluto v-1.1.6 released : DNS recon | Brute forcer | DNS Zone Transfer.

Bluto v-1.1.6 released : DNS recon | Brute forcer | DNS Zone Transfer.

Changelog v1.1.6:
– New Functionality: Email Enum
– Setup.py Update

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will brute force subdomains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’. NetCraft results are presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

Bluto v1.1.6 Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Debian And Kali 2.0

Bluto v1.1.6
Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Debian And Kali 2.0

Installation :
pip install git+git://github.com/RandomStorm/Bluto
Upgrade:
pip install git+git://github.com/RandomStorm/Bluto –upgrade

Download : bluto.zip | Our Post Before
Source: https://github.com/RandomStorm