All Projects → diogo-fernan → domfind

diogo-fernan / domfind

Licence: other
A Python DNS crawler to find identical domain names under different TLDs.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to domfind

Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+3840.91%)
Mutual labels:  dns, phishing, cybersecurity
Domainfuzz
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (+236.36%)
Mutual labels:  dns, phishing
Dnstwister
Domain name permutation as a service
Stars: ✭ 36 (+63.64%)
Mutual labels:  dns, phishing
Gorecon
Gorecon is a All in one Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool that every pentester/bughunter might wanna consider into their arsenal
Stars: ✭ 208 (+845.45%)
Mutual labels:  dns, crawler
domainerator
Simple application written in Go that combines two wordlists and a list of TLDs to form domain names and check if they are already registered.
Stars: ✭ 26 (+18.18%)
Mutual labels:  dns, tld
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+14100%)
Mutual labels:  dns, phishing
Dnsmorph
Domain name permutation engine written in Go
Stars: ✭ 148 (+572.73%)
Mutual labels:  dns, phishing
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+1136.36%)
Mutual labels:  phishing, cybersecurity
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+90.91%)
Mutual labels:  phishing, cybersecurity
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2972.73%)
Mutual labels:  phishing, cybersecurity
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+259.09%)
Mutual labels:  phishing, cybersecurity
Black Widow
GUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (+463.64%)
Mutual labels:  crawler, cybersecurity
Phishingkittracker
Let's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (+472.73%)
Mutual labels:  phishing, cybersecurity
dnstwister
Domain name permutation as a service
Stars: ✭ 46 (+109.09%)
Mutual labels:  dns, phishing
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+2677.27%)
Mutual labels:  phishing, cybersecurity
Is Google
Verify that a request is from Google crawlers using Google's DNS verification steps
Stars: ✭ 82 (+272.73%)
Mutual labels:  dns, crawler
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+113.64%)
Mutual labels:  phishing, cybersecurity
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+59.09%)
Mutual labels:  phishing, cybersecurity
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+3736.36%)
Mutual labels:  phishing, cybersecurity
sse-option-crawler
SSE 50 index options crawler 上证50期权数据爬虫
Stars: ✭ 17 (-22.73%)
Mutual labels:  crawler

domfind

domfind is a Python 3.6.x utility that tests for the existence of domain names under different Top Level Domains (TLDs). This is achieved by making a series of DNS requests for Start of Authority (SOA) records starting at the root servers and working down through the parent domains until the last parent replies with a SOA section or a NXDOMAIN response code indicating the nonexistence of the input domain name. Local or public DNS resolvers are purposefully not used in order to avoid cached records. It should be noted that the number of DNS queries performed grows linearly with the depth of the input domain and the number of TLDs to check for. For instance, sub1.sub2.domain.tld needs a total of three queries per TLD. The first one is directed at a root server, the second one goes to a NS server of domain.tld, and the third, final one to sub2.domain.tld.

This utility is useful to find malicious subdomains registered under multiple TLDs that might be used for phishing campaigns. Malicious actors often use the same domain name for related or subsequent campaigns for hosting web servers, which can be proactively found with domfind as a one-off, if a domain name is known, and acted upon accordingly afterwards. NS servers for the very last subdomain are never queried so as to avoid generating network traffic towards a potentially malicious infrastructure not yet in use, and thus remain under the radar of the adversary.

The main purpose of domfind is to serve as an intelligence tool for incident responders and security investigators alike. It can, nevertheless, be used for other, similar goals where domain names need finding.

Dependencies and Usage

domfind requires only a few modules that are specified in requirements.txt.

The supported options are the following:

Usage: domfind [-h] [-p <sec>] [-r] [-t <thread>] [-u] [-v ...]
               [-b | -d <file>]
               [<domain> ...]

Find identical domain names with SOA DNS records under different Top Level Domains (TLDs).

Options:
  -h, --help  show this help message and exit

  -b, --bad            use the known-bad TLD file at data/known-bad-tld.txt
  -d, --domain <file>  use the specified custom TLD file [default: data/tlds-alpha-by-domain.txt]
  -p, --pause <num>    wait an interval in seconds between each input domain [default: 0]
  -r, --raw            output raw hits (just the domain names)
  -t, --thread <num>   specify the size of the thread pool [default: number of CPU cores]
  -u, --update         update the local TLD list from IANA and the root name servers from InterNIC
  -v, --verbose        display verbose and debug messages

Examples

  • Split the pre-compiled known-bad TLD list across two threads for checking one input domain name:
$ python3 domfind.py -b -t 2 domain
  • Check two domain names across all TLDs listed by IANA, pause for 60 seconds between input domain names and be verbose:
$ python3 domfind.py -vp 60 sub2.sub1.domain1 sub.domain2

Future Work

  • Documentation;
  • Improve DNS querying performance, namely by building a list with the SOA servers for all TLDs and by implementing a local cache;
  • Improve DNS and general error handling;
  • Compile a list of known-bad hosting providers that allow the creation of subdomains under their own domain names.

Change History

  • domfind 20170329: added -r as a means to output domain names only.
  • domfind 20170318: first release.

Author

@dfernan__

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].