All Projects → subfinder → Goaltdns

subfinder / Goaltdns

Licence: mit
A permutation generation tool written in golang

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Goaltdns

Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (+69.75%)
Mutual labels:  hacking, infosec, netsec, bug-bounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+5989.08%)
Mutual labels:  hacking, infosec, bruteforce, bug-bounty
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+59.66%)
Mutual labels:  hacking, recon, bug-bounty
Iky
OSINT Project
Stars: ✭ 203 (+70.59%)
Mutual labels:  hacking, infosec, recon
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+19.33%)
Mutual labels:  bug-bounty, infosec, recon
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+2231.93%)
Mutual labels:  hacking, infosec, netsec
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+2789.92%)
Mutual labels:  recon, bug-bounty, infosec
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+147.06%)
Mutual labels:  bruteforce, bug-bounty, recon
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+155.46%)
Mutual labels:  hacking, infosec, bug-bounty
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+126.05%)
Mutual labels:  hacking, recon, bug-bounty
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (+228.57%)
Mutual labels:  hacking, infosec, netsec
flydns
Related subdomains finder
Stars: ✭ 29 (-75.63%)
Mutual labels:  bug-bounty, infosec, recon
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+327.73%)
Mutual labels:  hacking, infosec, bug-bounty
Bash scripting
bash scripting thing !
Stars: ✭ 118 (-0.84%)
Mutual labels:  hacking, recon, bug-bounty
Routersploit
Exploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+8190.76%)
Mutual labels:  infosec, bruteforce
Ecommerce Website Security Checklist
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-17.65%)
Mutual labels:  hacking, bug-bounty
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-15.13%)
Mutual labels:  hacking, bug-bounty
Brutemap
Let's find someone's account
Stars: ✭ 113 (-5.04%)
Mutual labels:  hacking, bruteforce
Bruteshark
Network Analysis Tool
Stars: ✭ 1,335 (+1021.85%)
Mutual labels:  hacking, bruteforce
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+1065.55%)
Mutual labels:  hacking, bug-bounty

GoAltdns

License Go Report Card contributions welcome

GoAltdns is a permutation generation tool that can take a list of subdomains, permute them using a wordlist, insert indexes, numbers, dashes and increase your chance of finding that estoeric subdomain that no-one found during bug-bounty or pentest. It uses a number of techniques to accomplish this. It can allow for discovery of subdomains that conform to patterns. GoAltdns takes in words that could be present in subdomains under a domain (such as test, dev, staging) as well as takes in a list of subdomains that you know of.

The tool itself is very simple and is built with golang concurrency providing it very quick execution times.

Installation Instructions

The installation is easy. Just go get the repo.

go get github.com/subfinder/goaltdns

Note - You need to copy the words.txt file into the same directory as the tool or specify it's location via the -w flag.

Upgrading

If you wish to upgrade the package you can use:

go get -u github.com/subfinder/goaltdns

Usage

GoAltdns can read hosts directly from standard input, or either take a single host as argument, or a list of hosts. To provide a single host, you can use the -h option. In order to provide a list of hosts, you can use the -l option.

Sample run:

[email protected]:~/tmp/goaltdns$ ./altdns -host phabricator.freelancer.com
1phabricator.freelancer.com
phabricator1.freelancer.com
10phabricator.freelancer.com
1-phabricator.freelancer.com
phabricator10.freelancer.com
phabricator-0.freelancer.com
1.phabricator.freelancer.com
...

Sample run reading from stdin:

[email protected]:~/tmp/goaltdns$ echo phabricator.freelancer.com | ./altdns 
1phabricator.freelancer.com
phabricator1.freelancer.com
10phabricator.freelancer.com
1-phabricator.freelancer.com
phabricator10.freelancer.com
phabricator-0.freelancer.com
1.phabricator.freelancer.com
...

You can pass custom wordlists using the -w option. Currently, it uses words.txt taken from here.

By default, goaltdns writes to the standard output. If you want to save the results to a file, you can use -o flag with the name of then file to write to it.

[email protected]:~/tmp/goaltdns$ ./altdns -l ~/uberinternal -o output.txt

This will render a blank console but the tool will still write to the output file.

License

GoAltdns is made with 🖤 by Subfinder team.

See the License file for more details.

Thanks

GoAltdns is heavily inspired from original altdns by @infosec_au and @nnwakelam. Thanks to them and their awesome research. Also, the wordlist is taken from haccer

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].