A cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. How it works? It tool doesn’t use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it tool very faster and reliable. The tool make use of multiple public available APIs to perform the search. If you want to know more about Certificate Transparency logs, read https://www.certificate-transparency.org/ Installation Linux If you want to install it, you can do that manually compiling the source or using the precompiled binary. Manually: You need to have Rust installed in your computer first. $ git clone https://github.com/Edu4rdSHL/findomain.git $ cd findomain $ cargo build –release $ sudo cp target/release/findomain /usr/bin/ $ findomain Using the binary: $ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux $ chmod +x findomain-linux $ ./findomain-linux If you are using the BlackArch Linux distribution, you just need to use: $ sudo pacman -S findomain Installation Windows Download the binary from https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe Open a CMD shell and go to the dir where findomain-windows.exe was downloaded. Exec: findomain-windows in the CMD shell. Installation MacOS $ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-osx $ chmod +x findomain-osx.dms $ ./findomain-osx.dms Usage You can use the tool in two ways, only discovering the domain name or discovering the domain + the IP address. findomain 0.1.4 Eduard Tolosa A tool that use Certificates Transparency logs to find subdomains. USAGE: findomain [FLAGS] [OPTIONS] FLAGS: -a, –all-apis Use all the available APIs to perform the search. It take more time but you will have a lot of more results. -h, –help Prints help information -i, –get-ip Return the subdomain list with IP address if resolved. -V, –version Prints version information OPTIONS: -f, –file Sets the input file to use. -o, –output Write data to output file in the specified format. [possible values: txt, csv, json] -t, –target Target host Examples Make a simple search of subdomains and print the info in the screen: findomain -t example.com Make a simple search of subdomains using all the APIs and print the info in the screen: findomain -t example.com -a Make a search of subdomains and export the data to a CSV file: findomain -t example.com -o csv Make a search of subdomains using all the APIs and export the data to a CSV file: findomain -t example.com -a -o csv Make a search of subdomains and resolve the IP address of subdomains (if possible): findomain -t example.com -i Make a search of subdomains with all the APIs and resolve the IP address of subdomains (if possible): findomain -t example.com -i -a Make a search of subdomains with all the APIs and resolve the IP address of subdomains (if possible), exporting the data to a CSV file: findomain -t example.com -i -a -o csv Features Discover subdomains without brute-force, it tool uses Certificate Transparency Logs. Discover subdomains with or without IP address according to user arguments. Read target from user argument (-t). Read a list of targets from file and discover their subdomains with or without IP and also write to output files per-domain if specified by the user, recursively. Write output to TXT file. Write output to CSV file. Write output to JSON file. Cross platform support: Linux, Windows, MacOS. Optional multiple API support. Issues and requests If you have a problem or a feature request, open an issue . Download Findomain
https://govanguard.io/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard https://govanguard.io/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-07-11 18:05:002019-07-11 18:05:00Findomain - A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com