Last updated on 2020/12/31
Introduction
SubzzZ can find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.
Passive Recon via:
[β] Crt.sh
[β] Web.Archive.org
[β] Dns.bufferover.run
[β] Threatcrowd.org
[β] Hackertarget.com
[β] Certspotter.com
[β] Anubis-DB(jonlu.ca)
[β] Virustotal
[β] Alienvault(otx)
[β] Urlscan.io
[β] Threatminer
[β] Entrust.com
[β] Riddler.io
[β] Dnsdumpster
[β] Rapiddns
[β] Choas
Active Recon via:
[β] Permutations, Mutations, Alterations
Usage
root@me_dheeraj:$ bash subzzZ
[-] Usage: ./subzzZ [-d/--domain] target.com
Output will be saved in scans/target.com-YYYY-MM-DD directory
Prerequisites
- python3
- jq
- shuffledns @projectdiscovery
- massdns @blechschmidt
- httpx @pdiscoveryio