Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Scanners Box | 7,483 | 2 months ago | 2 | |||||||
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑 | ||||||||||
Reconftw | 4,720 | 4 hours ago | 21 | mit | HTML | |||||
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities | ||||||||||
Bbot | 2,742 | 7 hours ago | 140 | August 17, 2023 | 17 | gpl-3.0 | Python | |||
OSINT automation for hackers. | ||||||||||
Pentest Tools | 2,652 | 9 months ago | 1 | Python | ||||||
A collection of custom security tools for quick needs. | ||||||||||
Subjack | 1,665 | 7 months ago | March 29, 2018 | 46 | apache-2.0 | Go | ||||
Subdomain Takeover tool written in Go | ||||||||||
Dictionary Of Pentesting | 1,612 | 2 months ago | Shell | |||||||
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。 | ||||||||||
Ksubdomain | 1,457 | 2 years ago | 18 | mit | Go | |||||
无状态子域名爆破工具 | ||||||||||
Metabigor | 1,003 | 5 days ago | 17 | July 08, 2023 | 4 | mit | Go | |||
OSINT tools and more but without API ke | ||||||||||
K8cscan | 996 | 4 years ago | 5 | mit | Python | |||||
K8Ladon大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动 | ||||||||||
Subover | 829 | 4 months ago | 14 | bsd-2-clause | Go | |||||
A Powerful Subdomain Takeover Tool |
Dome is a fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports. This tool is recommended for bug bounty hunters and pentester in their reconnaissance phase.
the more surface area exposed the faster a rock with break down
If you want to use more OSINT engines, fill the config.api file with the needed API tokens
Use OSINT techniques to obtain subdomains from the target. This mode will not make any connection to the target so it is undetectable. The basic use of this mode is:
python dome.py -m passive -d domain
Perform bruteforce attacks to obtain alive subdomains. There are 2 types of bruteforce:
-nb, --no-bruteforce
-w, --wordlist
. If no wordlists is specified, this mode won't be executedThis mode will also make passive mode attack but in this case, the connection is tested to ensure the subdomain is still alive. To disable passive scan in active scan mode, use --no-passive
flag
The basic use of this mode is:
python dome.py -m active -d domain -w wordlist.txt
Add -p
option or a built-it port option (see usage menu) to perform port scanning
python dome.py -m active -d domain -w wordlist.txt -p 80,443,8080
You can run Dome with Python 2 or 3. Python3 is recommended
Install the dependencies and run the program
git clone https://github.com/v4d1/Dome.git
cd Dome
pip install -r requirements.txt
python dome.py --help
Dome uses these web pages to obtain subdomains
Without API:
With API:
Feel free to implement this features
Arguments | Description | Arg example |
---|---|---|
-m, --mode | Scan mode. Valid options: active or passive | active |
-d, --domain | Domains name to enumerate subdomains (Separated by commas) | hackerone.com,facebook.com |
-w, --wordlist | Wordlist containing subdomain prefix to bruteforce | subdomains-5000.txt |
-i, --ip | When a subdomain is found, show its ip | |
--no-passive | Do not use OSINT techniques to obtain valid subdomains | |
-nb, --no-bruteforce | Dont make pure bruteforce up to 3 letters | |
-p, --ports | Scan the subdomains found against specific tcp ports | 80,443,8080 |
--top-100-ports | Scan the top 100 ports of the subdomain (Not compatible with -p option) | |
--top-1000-ports | Scan the top 1000 ports of the subdomain (Not compatible with -p option) | |
--top-web-ports | Scan the top web ports of the subdomain (Not compatible with -p option) | |
-s, --silent | Silent mode. No output in terminal | |
--no-color | Dont print colored output | |
-t, --threads | Number of threads to use (Default: 25) | 20 |
-o, --output | Save the results to txt, json and html files | |
--max-response-size | Maximun length for HTTP response (Default:5000000 (5MB)) | 1000000 |
--r, --resolvers | Textfile with DNS resolvers to use. One per line | resolvers.txt |
-h, --help | Help command | |
--version | Show dome version and exit | |
-v, --verbose | Show more information during execution |
Perform active and passive scan, show the ip adress of each subdomain and make a port scan using top-web-ports. Data will also be written in /results folder:
python dome.py -m active -d domain -w wordlist.txt -i --top-web-ports -o
Perform passive scan in silent mode and write output to files.
python dome.py -m passive -d domain --silent --output
Perform active scan without passive and port scan
python dome.py -m active -d domain -w wordlist.txt --no-passive
Only bruteforce with wordlist
python dome.py -m active -d domain -w wordlist.txt --no-bruteforce
Scan active and passive and perform port scan ONLY in ports 22,80,3306
python dome.py -m active -d domain -w wordlist.txt -p 22,80,3306
You can contact me at [email protected]
License: for commercial use, contact me at email above