Skip to content

This script uses subfinder, findomain, assetfinder, amass, httpx, and nmap to enumerate subdomains, check for live domains, and check for open ports.

Notifications You must be signed in to change notification settings

itszeeshan/Subdomain-Grepper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Introducing Subdomain Grepper:

Your go-to tool for finding and checking subdomains. It combines different tools to give you a clear picture of a website's subdomains, including any potential security risks by detecting technology used. By scanning for open ports and checking status codes, it helps you understand which subdomains are active and secure. Plus, it makes sure you don't get bogged down by repeating information. Say goodbye to complicated searches and hello to easy, efficient subdomain analysis with Subdomain Grepper!

Tools you need to install before using it:

How to use:

  • Clone this repo.
Run bash install.sh
  • Now you can use the tool like this:
subgrep [-h] <wildcard_file> <unique_name>

image

  • Example Wildcard File:
    Create a wildcard file with no extension. Just "wildcard" - no .txt etc. In that file add the domains for example facebook.com, meta.com.

image

Output Files:

The script will create a file called subdomains that contains all the subdomains found, a file called httpxout that contains all the live domains found, and a file called nmapout that contains all the open ports found. Filenames are:

  1. subdomains (all unique subdomains)
  2. nmapout (with port scanning information)
  3. httpxout (with status code, page title, and techdetected)

About

This script uses subfinder, findomain, assetfinder, amass, httpx, and nmap to enumerate subdomains, check for live domains, and check for open ports.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages