Sublist3r v1.0 released : Fast subdomains enumeration tool for penetration testers

Sublist3r v1.0 released : Fast subdomains enumeration tool for penetration testers

Changelog and What’s new in v1.0 ?
+ Fixed Sublist3r v1.0 on Windows Platform
+ Added New OSINT Sources
— Virustotal: Now sublist3r can enumerate subdomains through Virustotal
— SSL Certs: Now sublist3r can enumerate subdomains through the SSL certificates information.
— PassiveDNS: Now sublist3r can enumerate subdomains through the passive DNS records.
+ Added Port Scan Feature
— Now you can filter and scan the found subdomains against specific tcp ports using -p option.
+ Added Threading to DNSdumpster:
— Now DNSdumpster will show the live and working hosts using multi threading.
+ Improved the subbrute wordlist:
— Added new subdomains wordlist to subbrute based on Bitquark’s dnspop researchSublister-run

Sublist3r is python tool that is designed to enumerate subdomains of websites using search engines. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r currently supports the following search engines: Google, Yahoo, Bing, Baidu, and Ask. More search engines may be added in the future. Sublist3r also gathers subdomains using Netcraft and DNSdumpster.subllist3r-help

subbrute was integrated with Sublist3r to increase the possibility of finding more subdomains using bruteforce with an improved wordlist. The credit goes to TheRook who is the author of subbrute.

Dependencies:
+ Requests library (http://docs.python-requests.org/en/latest/)
+ dnspython library (http://www.dnspython.org/)

Installation :

Source:https://github.com/aboul3la | Download: v1.0.zip | v1.0tar.gz | Our Post Before