Frogy's Subdomain Enumeraton - It's not yet another Subdomain Enumeration tool
An automation tool that scans sub-domains using multiple tools. Most importantly, it greps all the words from the first, second and N level of subdomains and creates a wordlist. Then uses crt.sh to brute force every single name to identify any hidden subdomains out there.
-
Requirements: Go Language, Python 3.+, jq
-
Tools used - You must need to install these tools to use this script
- SubFinder - Download and put it into the /user/bin folder with executable permission
- Assetfinder - Download and put it into the /user/bin folder with executable permission
- Find-domain - Download and put it into the /user/bin folder with executable permission
- httprobe - Download and put it into the /user/bin folder with executable permission
- anew - Download and put it into the /user/bin folder with executable permission
-
Installation
apt install jq git clone https://github.com/iamthefrogy/frogy-subdomain-enumeration.git && cd frogy-subdomain-enumeration/ && chmod +x frogy.sh
-
Usage
./frogy.sh
TODO
-
✅ Efficient folder structure management - Guide on how to find new domains for X organisation on daily basis
Thanks to the authors of the tools used in this script.
Warning: This is just a research project. Kindly use it with caution and at your own risk.