All Projects → XiphosResearch → Dnsbrute

XiphosResearch / Dnsbrute

Licence: mit
DNS Sub-domain brute forcer, in Python + gevent

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Dnsbrute

Aiodnsbrute
Python 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (+825%)
Mutual labels:  dns, pentesting, brute-force
Gobuster
Directory/File, DNS and VHost busting tool written in Go
Stars: ✭ 5,356 (+13290%)
Mutual labels:  dns, pentesting, tool
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+18015%)
Mutual labels:  pentesting, scanner, brute-force
Getaltname
Extract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (+700%)
Mutual labels:  dns, pentesting, tool
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+2017.5%)
Mutual labels:  dns, pentesting, scanner
Information collection handbook
Handbook of information collection for penetration testing and src
Stars: ✭ 447 (+1017.5%)
Mutual labels:  dns, pentesting
Dictionary Of Pentesting
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+1130%)
Mutual labels:  dns, pentesting
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+1172.5%)
Mutual labels:  pentesting, scanner
Xspear
Powerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+1357.5%)
Mutual labels:  scanner, tool
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (+890%)
Mutual labels:  pentesting, brute-force
Bugcrowd Levelup Subdomain Enumeration
This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
Stars: ✭ 513 (+1182.5%)
Mutual labels:  dns, pentesting
Blazy
Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
Stars: ✭ 637 (+1492.5%)
Mutual labels:  scanner, brute-force
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+967.5%)
Mutual labels:  pentesting, tool
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+932.5%)
Mutual labels:  scanner, tool
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+907.5%)
Mutual labels:  pentesting, scanner
Thc Hydra
hydra
Stars: ✭ 5,645 (+14012.5%)
Mutual labels:  pentesting, brute-force
Perun
Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+1832.5%)
Mutual labels:  pentesting, scanner
Gourdscanv2
被动式漏洞扫描系统
Stars: ✭ 740 (+1750%)
Mutual labels:  pentesting, scanner
Whour
Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-55%)
Mutual labels:  dns, scanner
Ladongo
Ladon Pentest Scanner framework 全平台LadonGo开源内网渗透扫描器框架,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。
Stars: ✭ 366 (+815%)
Mutual labels:  scanner, brute-force

DNSbrute

Fast and lightweight DNS sub-domain brute forcer, with a progres bar!

A viable alternative or companion to subbrute, dnscan, massdns, subsearch, dnsrecon, knock, dns_extractor, Bluto, snoopbrute, gobuster, fierce, dnsmap, dnsenum and DNS-Discovery. It seems everybody and their dog has made a DNS subdomain discovery tool!

But, why is this one different? What else does it do?

Features

  • Progress bar... awesomeness!
  • Wildcard elimination
  • JSON & text output
  • DNS resolver checker
  • Tunable retries & timeout
  • Free & liberal open-source

TODO

  • DNS zone transfer
  • Randomized order & delay
  • Reverse DNS / PTR lookup
  • Queued processing (ZeroMQ, Beanstalkd etc)

DNSbrute Usage

$ python -mdnsbrute
usage: __main__.py [-h] [-p] [-q] [-v] [--debug] [-o OUTFILE] [-j OUTJSON]
                   [-r RESOLVERS_FILE] [-n NAMES_FILE] [-d DOMAINS_FILE]
                   [-W N] [-R N] [-C N] [-T SECS]
                   [domain [domain ...]]

DNS sub-domain brute forcer

positional arguments:
  domain                One or more domains

optional arguments:
  -h, --help            show this help message and exit
  -p, --progress        Show progress bar with ETA
  -q, --quiet           Don't print results to console
  -v, --verbose         Log informational messages
  --debug               Log debugging messages
  -o OUTFILE, --output OUTFILE
                        Output results to file
  -j OUTJSON, --json OUTJSON
                        Output results, as JSON to file
  -r RESOLVERS_FILE, --resolvers RESOLVERS_FILE
                        Load DNS resolver servers from file
  -n NAMES_FILE, --names NAMES_FILE
                        Load brute-force names from file
  -d DOMAINS_FILE, --domains DOMAINS_FILE
                        Load target domains from file
  -W N, --wildcard-tests N
                        Wildcard elimination test queries, default: 3
  -R N, --retries N     Retries on failed DNS request, default: 2
  -C N, --concurrency N
                        Concurrent DNS requests, default: 20
  -T SECS, --timeout SECS
                        Timeout for DNS request in seconds, default: 1.5

checkresolvers usage

$ python -mdnsbrute.checkresolvers
usage: checkresolvers.py [-h] [-o OUTFILE] [-D] [-T SECS] [-q] [-v] [--debug]
                         [-r RESOLVERS_FILE]

DNS resolver list checker

optional arguments:
  -h, --help            show this help message and exit
  -o OUTFILE, --output OUTFILE
                        Output results to file
  -D, --download        Download new list of resolvers from public-dns.info
  -T SECS, --timeout SECS
                        Timeout for DNS request in seconds, default: 0.5
  -q, --quiet           Don't print results to console
  -v, --verbose         Log informational messages
  --debug               Log debugging messages
  -r RESOLVERS_FILE, --resolvers RESOLVERS_FILE
                        Load DNS resolver servers from file

Wordlist Generator

Included with the dnsbrute source code are a collection of tools to extract DNS names from Bind style zone files, these can be extracted from Dig results, from AXFR transfer, or by scraping them from Bind config directories.

Three scripts are included:

  • axfr.sh - Try to perform zone transfers on the Alexa top million
  • process-axfr.py - Extract names and record types from zone files into SQLite DB
  • verify-axfr.py - Verify which extracted names match zone files

For your reference we provide a list of the top 20,000 DNS names as extracted from all servers in the Alexa top million which allow anonymous zone transfers ;)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].