SkillAgentSearch skills...

DNSBruter

A DNS brute-force tool utilizing shuffledns and massdns, supporting both static and dynamic modes (single subdomain or subdomain list). Ideal for penetration testers and bug hunters focusing on DNS-based reconnaissance.

Install / Use

/learn @rjsoheil/DNSBruter
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

DNSBruter

Untitled design

This tool accurately uses both static and dynamic modes for subdomain brute forcing and stores it in its database (optional).

  • Static
  • Dynamic
    • Single subdomain
    • List of subdomains
  • New data storage (mongo database)

Preview

image

Installation

git clone https://github.com/rjsoheil/DNSBruter.git
pip install -r requirements.txt
cat script.txt >> ~/.zshrc OR cat script.txt >> ~/.bashrc
source ~/.zshrc

To use this tool, you must have the following tools installed:

Usage

Static Brute Force

  • Command:
    • python3 main.py --mode static -w words.txt -d target.com --path-massdns /usr/bin/massdns -r ~/resolvers

Dynamic Brute Force

  • On the list of subdomains:
    • python3 main.py --mode dynamic --list-subs target-subs.txt -w words-merged.txt -d target.com -pm /usr/bin/massdns -r ~/resolvers
  • On the single subdomain:
    • python3 main.py --mode dynamic -w words-merged.txt -d api.target.com -pm /usr/bin/massdns -r ~/resolvers

Data storage

This tool uses Mongo database for data storage

  • Switch: --insert Stored data:
    • Subdomain
    • Data added
    • Mode (The mode in which the tool found this subdomain)

Get a list of subdomains

  • Filter by mode
    • python3 main.py --get -d target.com -m static
  • Without filtering
    • python3 main.py -g -d target.com
View on GitHub
GitHub Stars8
CategoryCustomer
Updated1mo ago
Forks1

Languages

Python

Security Score

70/100

Audited on Jan 31, 2026

No findings