All Projects → thelikes → gwdomains

thelikes / gwdomains

Licence: other
sub domain wild card filtering tool

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to gwdomains

h1-search
Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (+52.63%)
Mutual labels:  infosec, bugbounty
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+1157.89%)
Mutual labels:  infosec, bugbounty
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+273.68%)
Mutual labels:  infosec, bugbounty
Contact.sh
An OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+468.42%)
Mutual labels:  infosec, bugbounty
lit-bb-hack-tools
Little Bug Bounty & Hacking Tools⚔️
Stars: ✭ 180 (+373.68%)
Mutual labels:  infosec, bugbounty
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+107.89%)
Mutual labels:  infosec, bugbounty
rejig
Turn your VPS into an attack box
Stars: ✭ 33 (-13.16%)
Mutual labels:  infosec, bugbounty
Basecrack
Decode All Bases - Base Scheme Decoder
Stars: ✭ 196 (+415.79%)
Mutual labels:  infosec, bugbounty
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+502.63%)
Mutual labels:  infosec, bugbounty
urldedupe
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+447.37%)
Mutual labels:  infosec, bugbounty
Subcert
Subcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (+52.63%)
Mutual labels:  infosec, bugbounty
Astra
Astra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+392.11%)
Mutual labels:  infosec, bugbounty
Can I Take Over Xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+7289.47%)
Mutual labels:  infosec, bugbounty
fuzzmost
all manner of wordlists
Stars: ✭ 23 (-39.47%)
Mutual labels:  infosec, bugbounty
Qsfuzz
qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
Stars: ✭ 201 (+428.95%)
Mutual labels:  infosec, bugbounty
flydns
Related subdomains finder
Stars: ✭ 29 (-23.68%)
Mutual labels:  infosec, bugbounty
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+328.95%)
Mutual labels:  infosec, bugbounty
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+378.95%)
Mutual labels:  infosec, bugbounty
SuperLibrary
Information Security Library
Stars: ✭ 60 (+57.89%)
Mutual labels:  infosec, bugbounty
goverview
goverview - Get an overview of the list of URLs
Stars: ✭ 93 (+144.74%)
Mutual labels:  infosec, bugbounty

gwdomains

Get (rid of) Wildcard Domains

Install

go get github.com/thelikes/gwdomains

Run

This tool takes a list of potential sub domains and filters out only legitimate domains. For use with tools like altdns, dnsgen, and syborg.

How to

Steps

  1. Brute force sub domains (knock,amass,fierce,subfinder,etc)
  2. Run a mutator (dnsgen,syborg,etc)
  3. Resolve the mutations
  4. Feed gwdomains the mutated sub domains

Run

cat mutated.txt | gwdomains

Debug

Verbose output:

cat mutated.txt |MYGODEBUG=true gwdomains

Thanks

HuG3 thanks to OWASP Amass

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].