Bluto v1.1.14 ~ DNS Recon | Brute Forcer | DNS Zone Transfers | Email Enumeration | User Enumeration.

Bluto v1.1.14 ~ DNS Recon | Brute Forcer | DNS Zone Transfers | Email Enumeration | User Enumeration.

Changelog v1.1.14 Full Featured:
+ DNS Enumeration
+ Mail Server Enumeration
+ Zone Transfer Testing
+ Wild Card Testing
+ Sub-Domain Brute-Forcing (Top 20,000 sub-domains from the The Alexa Top 1 Million)
+ Interesting Target Identification
+ Passive Sub-Domain Gathering (NetCraft)
+ Email Enumeration (Google, Bing, LinkedIn)
+ User Enumeration (LinkedIn)
+ Source Smart Searching (Google, Bing, LinkedIn searches based on your location, to make sure searches are as fast as possible)
+ Evidence Report (Gives you the url locations of the gathered data to allow for potential remediation)

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will brute force subdomains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’. NetCraft results are presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

Bluto-v-1-1-14 Bluto v1.1.6 Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Centos, FreeBSD,redhat Fedora, Debian And Kali 2.0

Bluto-v-1-1-14
Bluto v1.1.6
Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Centos, FreeBSD,redhat Fedora, Debian And Kali 2.0

Installation :

Our Post Before
Source: https://github.com/RandomStorm