SubBrute – Subdomain Brute-forcing Tool

Usage: subbrute.exe [options] target

Options:

  h, help            show this help message and exit

  s SUBS, subs=SUBS  (optional) list of subdomains,  default = ‘names.txt’

  r RESOLVERS, resolvers=RESOLVERS

                        (optional) A list of DNS resolvers, if this list is

                        empty it will OS‘s internal resolver default =

                        ‘resolvers.txt

  f FILTER, filter_subs=FILTER

                        (optional) A file containing unorganized domain names

                        which will be filtered into a list of subdomains

                        sorted by frequency.  This was used to build

                        names.txt.

  t TARGETS, targets_file=TARGETS

                        (optional) A file containing a newline delimited list

                        of domains to brute force.

  o OUTPUT, output=OUTPUT

                        (optional) Output to file

  a, A                (optional) Print all IPv4 addresses for sub domains

                        (default = off).

  type=TYPE           (optional) Print all reponses for an arbitrary DNS

                        record type (CNAME, AAAA, TXT, SOA, MX...)

  c PROCESS_COUNT, process_count=PROCESS_COUNT

                        (optional) Number of lookup theads to run. default =

                        16

  v, verbose         (optional) Print debug information.

Leave a Reply