+ https://crt.sh
+ http://web.archive.org
+ https://dns.bufferover.run
+ https://www.threatcrowd.org
+ https://api.hackertarget.com
+ https://certspotter.com
+ https://jldc.me/
+ https://www.virustotal.com
+ https://otx.alienvault.com
+ https://urlscan.io
+ https://api.threatminer.org
+ https://ctsearch.entrust.com
+ https://riddler.io
+ https://dnsdumpster.com
+ https://rapiddns.io
[-] Removed service
- https://suip.biz (Amass,Subfinder,Findomain)
# 🔨 Used Passive Scan Tool
+ Findomain
+ Subfinder
+ Assetfinder
./sub.sh -s webscantest.com
curl -sL https://git.io/JesKK | bash /dev/stdin -s webscantest.com
./sub.sh -a webscantest.com
./sub.sh -i
nano ~/.bashrc or nano ~/.zshrc
export GOPATH=$HOME/go
export PATH=$PATH:$GOROOT/bin:$GOPATH/bin
source ~/.bashrc ; source ~/.zshrc
go get -u github.com/tomnomnom/httprobe
go get -u github.com/projectdiscovery/subfinder/cmd/subfinder
go get -u github.com/tomnomnom/assetfinder
go get -v -u github.com/OWASP/Amass/v3/...
Use this link to test Sub.sh directly in your browser:
or
function subdomain() { curl -sL https://git.io/JesKK | bash /dev/stdin "$1" "$2" }
subdomain webscantest.com
CMD |
---|