/Dnsbruter

Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently bruteforce and identify potential subdomains for a given target domain. With its multithreading capability, users can control the concurrency level to speed up the process.

Primary LanguagePythonApache License 2.0Apache-2.0

Dnsbruter - Active Subdomain Enumeration Tool

Dnsbruter is a command-line tool designed for active subdomain enumeration through brute-forcing techniques. It helps security researchers and penetration testers discover potential subdomains for a given target domain. The tool allows users to customize their search and provides options for saving and displaying results.

New Features

Dnsbruter comes with the following features:

  • Define the number of threads to use for faster processing.
  • Define the concurrency for multiple processing for brutforcing subdomains
  • User desired verbose and concise mode to print valid
  • Main focued in concurrecy for brutforcing the subdomains
  • Able to save output Whether its a directory or text file
  • User defined wordlist or built-in wordlist provided for brutforcing subdomains
  • Dnsbruter works like NSE script of nmap to find subdomains by brutforcing

Installation

ALL Users

Method 1:

pip install dnsbruter

dnsbruter -h

Method 2:

git clone https://github.com/sanjai-AK47/Dnsbruter.git
cd Dnsbruter
pip install .
dnsbruter -h

Usage

To start using Dnsbruter, use the following command-line options:

dnsbruter -h                                                                                      
usage: dnsbruter [-h] [-d DOMAIN] [-w WORDLIST] [-o OUTPUT] [-v] [-cn Concise] [-t THREADS] [-C CONCURRENCY]

[INFO]: Discover hidden subdomains effortlessly with Dnsbruter

options:
  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        [INFO]: Target name to find hidden subdomains
  -w WORDLIST, --wordlist WORDLIST
                        [INFO]: Wordlist that contains a list of subdomains for bruteforcing
  -o OUTPUT, --output OUTPUT
                        [INFO]: Filename to save the output
  -v, --verbose         [INFO]: Verbose mode will print the valid subdomains that found
  -cn, --concise        [INFO]: Concise mode will print the invalid subdomains that found
  -t THREADS, --threads THREADS
                        [INFO]: Thread level for Multiple Threads
  -C CONCURRENCY, --concurrency CONCURRENCY
                        [INFO]: Concurrency level for Concurrency Process

Example:

Screenshot from 2023-10-01 23-12-08

dnsbruter --domain google.com --output output.txt --verbose  --threads 50 --concurrency 5 --wordlist /path/to/wordlists

This command is recommonded for all and will perform perfect active subdomain enumeration on the google.com domain using 50 threads + 5 concurrecy multiprocessing, save the results to output.txt, display found and valid domains in verbose mode, and print invalid domains during the enumeration process if the concise mode is enabled

Show you love ❤️ and give ⭐ for Dnsbruter

We hope this tool proves useful for your subdomain enumeration needs. Happy hacking! 🚀