Bluto v1.1.22 ~ DNS Recon | Brute Forcer | DNS Zone Transfers | Email Enumeration | User Enumeration.

Bluto v1.1.22 ~ DNS Recon | Brute Forcer | DNS Zone Transfers | Email Enumeration | User Enumeration.

Changelog v1.1.22 Full Featured:
+ setup.py and Bluto folder version Fix.

Bluto v1.1.22

Bluto v1.1.22

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will brute force subdomains using parallel sub processing on the top 20000 of the ‘The Alexa Top 1 Million subdomains’. NetCraft results are presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

Bluto-v-1-1-14 Bluto v1.1.6 Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Centos, FreeBSD,redhat Fedora, Debian And Kali 2.0

Bluto-v-1-1-14
Bluto is attempting to brute force the target domain. this Tools has been tested on Ubuntu, Arch Linux, Centos, FreeBSD,redhat Fedora, Debian And Kali 2.0

Installation And Update Using Git:

Our Post Before
Source: https://github.com/RandomStorm