#SubDomainTakeover | #Subdomain Enumeration Tools | #Sudomy vs #Sublist3r vs #HostileSubBruteForcer
#Sudomy
Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally.
Subdomain enumeration process can be achieved by using active method or passive method
#Sudomy utilize #Gobuster tools because of its highspeed performance in carrying out #DNS #Subdomain #Bruteforce #attack (wildcard support). The wordlist that is used comes from combined SecList (Discover/DNS) lists which contains around 3 million entries
By evaluating and selecting the good third-party sites/resources, the enumeration process can be optimized. More results will be obtained with less time required. Sudomy can collect data from these well-curated 22 third-party sites:
#Sblist3r is a #python tool designed to enumerate #subdomains of websites using #OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as #Google, Yahoo, Bing, Baidu and Ask. #Sublist3r also enumerates subdomains using Netcraft, #Virustotal, #ThreatCrowd, #DNSdumpster and #ReverseDNS.
#subbrute was integrated with #Sublist3r to increase the possibility of finding more subdomains using bruteforce with an improved wordlist. The credit goes to TheRook who is the author of #subbrute.
About: Hello friends, Welcome to “H4K4U”, I created this channel on 7th December 2019, my motive behind creating this channel is to provide all cyber security knowledge and all other updates regarding cyber security latest tools,technology & cyber tutorial Videos, so that you all can understand cyber sec batter, and I want each and every individual whoever is interested in cyber security and want to learn Info sec in the easiest possible way. I post videos lecture theory as well as practical demo on topics that cover latest cyber tech tools and what iit become to pro and how technology actually works and even how to secure after exploitation and other cyber update too .
#keylogging #cybersecurity #keylogger #msfconsole #howkeyloggerworks #metasploit #h4k4u #subscribe #trending #python #infosec #pentesteracademy #hackthebox
by H4K4U
linux smtp server