
Sublist3r
#Security Testing#Offensive Security
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Sublist3r: A Python Tool for Subdomain Enumeration
Sublist3r is a Python tool specifically created to identify and enumerate the subdomains of websites using Open Source Intelligence (OSINT).
Assisting Penetration Testers and Bug Hunters in Subdomain Collection
This tool assists penetration testers and bug hunters in collecting and gathering subdomains for their targeted domain. Sublist3r enumerates subdomains by utilizing various search engines, including Google, Yahoo, Bing, Baidu, and Ask. Additionally, Sublist3r gathers subdomains from sources such as Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS. To enhance the likelihood of discovering more subdomains, subbrute has been integrated with Sublist3r, allowing for brute-force enumeration using an improved wordlist.
Acknowledgment to TheRook
The credit goes to TheRook, the author of Subbrute. Below are the installation instructions:
Installation:
Clone the repository using the following command:
git clone https://github.com/aboul3la/Sublist3r.git
Recommended Python Version:
Sublist3r is compatible with both Python 2 and Python 3.
Recommended Python Versions and Dependencies
The recommended version for Python 2 is 2.7.x. The recommended version for Python 3 is 3.4.x. Dependencies: Sublist3r relies on the following Python modules: requests, dnspython, and argparse.
Installing Dependencies
You can install these dependencies using the requirements file:
Installation on Windows:
`c:\python27\python.exe -m pip install -r requirements.txt`
Installation on Linux:
`sudo pip install -r requirements.txt`
Alternatively, you can install each module individually.