DNSBruter
A DNS brute-force tool utilizing shuffledns and massdns, supporting both static and dynamic modes (single subdomain or subdomain list). Ideal for penetration testers and bug hunters focusing on DNS-based reconnaissance.
Install / Use
/learn @rjsoheil/DNSBruterREADME
DNSBruter
This tool accurately uses both static and dynamic modes for subdomain brute forcing and stores it in its database (optional).
- Static
- Dynamic
- Single subdomain
- List of subdomains
- New data storage (mongo database)
Preview
Installation
git clone https://github.com/rjsoheil/DNSBruter.git
pip install -r requirements.txt
cat script.txt >> ~/.zshrc OR cat script.txt >> ~/.bashrc
source ~/.zshrc
To use this tool, you must have the following tools installed:
Usage
Static Brute Force
- Command:
python3 main.py --mode static -w words.txt -d target.com --path-massdns /usr/bin/massdns -r ~/resolvers
Dynamic Brute Force
- On the list of subdomains:
python3 main.py --mode dynamic --list-subs target-subs.txt -w words-merged.txt -d target.com -pm /usr/bin/massdns -r ~/resolvers
- On the single subdomain:
python3 main.py --mode dynamic -w words-merged.txt -d api.target.com -pm /usr/bin/massdns -r ~/resolvers
Data storage
This tool uses Mongo database for data storage
- Switch:
--insertStored data:- Subdomain
- Data added
- Mode (The mode in which the tool found this subdomain)
Get a list of subdomains
- Filter by mode
python3 main.py --get -d target.com -m static
- Without filtering
python3 main.py -g -d target.com
