Basic python based subdomain bruteforce tool, part of Python for cybersecurity project.
pip3 install requests
usage: subenum.py -d <target.com> [options]
optional arguments:
-h , --help Show usage and help options
-d , --domain Target domain
-w , --wordlist Path to wordlist to bruteforce
-o , --output Filename to save. (Default: <subdomain>.txt)
--about Print about information
Linux:
python3 subenum.py -d example.com -w subdomain.txt
Windows:
python subenum.py -d example.com -w subdomain.txt
By default output will be saved as example-com.txt
Feel free to open and issue if you face bugs or errors in this tool.
- Threading.
- Logging.
Twitter 0xRyuk
Credits : subdomain.txt list from SecLists